Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
MicrosoftAzure File Sync CVE-2025-53729 Microsoft Azure File Sync Elevation of Privilege Vulnerability
MicrosoftAzure OpenAI CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability
MicrosoftAzure Portal CVE-2025-53792 Azure Portal Elevation of Privilege Vulnerability
MicrosoftAzure Stack CVE-2025-53793 Azure Stack Hub Information Disclosure Vulnerability
MicrosoftAzure Stack CVE-2025-53765 Azure Stack Hub Information Disclosure Vulnerability
MicrosoftAzure Virtual Machines CVE-2025-49707 Azure Virtual Machines Spoofing Vulnerability
MicrosoftAzure Virtual Machines CVE-2025-53781 Azure Virtual Machines Information Disclosure Vulnerability
MicrosoftDesktop Windows Manager CVE-2025-53152 Desktop Windows Manager Remote Code Execution Vulnerability
MicrosoftDesktop Windows Manager CVE-2025-50153 Desktop Windows Manager Elevation of Privilege Vulnerability
MicrosoftGitHub Copilot and Visual Studio CVE-2025-53773 GitHub Copilot and Visual Studio Remote Code Execution Vulnerability
MicrosoftGraphics Kernel CVE-2025-50176 DirectX Graphics Kernel Remote Code Execution Vulnerability
MicrosoftKernel Streaming WOW Thunk Service Driver CVE-2025-53149 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
MicrosoftKernel Transaction Manager CVE-2025-53140 Windows Kernel Transaction Manager Elevation of Privilege Vulnerability
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38163 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38126 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38165 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38158 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38157 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38155 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38138 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38122 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38085 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38089 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38083 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38072 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38079 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38112 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38115 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38111 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38097 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38100 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38166 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38274 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38278 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38265 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38236 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38239 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38285 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38323 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38328 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38313 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38286 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38307 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38200 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38202 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38182 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38174 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38181 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38208 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38219 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38230 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38225 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38214 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38217 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38185 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38194 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38197 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38146 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38161 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38183 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38251 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38257 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38258 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38218 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38220 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38222 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38088 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38090 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38102 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38065 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38078 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38081 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38135 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38136 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38143 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38103 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38113 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38127 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38277 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2025-4947 Unknown
6b3ad84c-e1a6-4bf7-a703-f496b71e49dbMariner CVE-2025-4748 Unknown
secalert_us@oracle.comMariner CVE-2025-50091 Unknown
cve-coordination@google.comMariner CVE-2025-1550 Unknown
cve@gitlab.comMariner CVE-2024-4853 Unknown
security-advisories@github.comMariner CVE-2024-43806 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38044 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38068 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38071 Unknown
cna@vuldb.comMariner CVE-2025-7545 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38004 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38039 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38321 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38331 Unknown
cve@gitlab.comMariner CVE-2024-2955 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38300 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38305 Unknown
cve@mitre.orgMariner CVE-2023-26819 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38424 Unknown
security-advisories@github.comMariner CVE-2024-48916 Unknown
secalert@redhat.comMariner CVE-2025-4948 Unknown
secalert_us@oracle.comMariner CVE-2025-53023 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38363 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38416 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38332 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38231 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38244 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38215 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38192 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38193 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38245 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38310 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38320 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38263 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38260 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38275 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38184 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38123 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38131 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38107 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38087 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38092 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38142 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38170 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38180 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38149 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38145 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38147 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38312 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38362 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38365 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38354 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38498 Unknown
cve-coordination@google.comMariner CVE-2025-4565 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38415 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38430 Unknown
cve@gitlab.comMariner CVE-2024-4855 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38429 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38419 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38428 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38436 Unknown
cve@mitre.orgMariner CVE-2015-3310 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38352 Unknown
cna@vuldb.comMariner CVE-2022-4603 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38319 Unknown
security-advisories@github.comMariner CVE-2023-37464 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38368 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38422 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38425 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38420 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38369 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38418 Unknown
secalert_us@oracle.comMariner CVE-2025-50082 Unknown
secalert_us@oracle.comMariner CVE-2025-50084 Unknown
secalert_us@oracle.comMariner CVE-2025-50081 Unknown
secalert_us@oracle.comMariner CVE-2025-50076 Unknown
secalert_us@oracle.comMariner CVE-2025-50079 Unknown
secalert_us@oracle.comMariner CVE-2025-50085 Unknown
secalert_us@oracle.comMariner CVE-2025-50100 Unknown
secalert_us@oracle.comMariner CVE-2025-50101 Unknown
secalert_us@oracle.comMariner CVE-2025-50096 Unknown
secalert_us@oracle.comMariner CVE-2025-50093 Unknown
secalert_us@oracle.comMariner CVE-2025-50094 Unknown
secalert@redhat.comMariner CVE-2025-5791 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38343 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38344 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38342 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38334 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38338 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38347 Unknown
openssl-security@openssl.orgMariner CVE-2022-4304 Unknown
cve@mitre.orgMariner CVE-2025-47268 Unknown
secalert@redhat.comMariner CVE-2022-4743 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38348 Unknown
secalert@redhat.comMariner CVE-2025-49177 Unknown
secalert_us@oracle.comMariner CVE-2025-50102 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38040 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38043 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38037 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-37987 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38003 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38052 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38080 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38084 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38077 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38062 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38066 Unknown
secalert@redhat.comMariner CVE-2025-4432 Unknown
security-advisories@github.comMariner CVE-2025-53905 Unknown
security-advisories@github.comMariner CVE-2025-53906 Unknown
security@php.netMariner CVE-2025-6491 Unknown
security@php.netMariner CVE-2025-1220 Unknown
security@php.netMariner CVE-2025-1735 Unknown
secalert@redhat.comMariner CVE-2025-49175 Unknown
security-advisories@github.comMariner CVE-2025-48938 Unknown
security-advisories@github.comMariner CVE-2024-45310 Unknown
cna@vuldb.comMariner CVE-2025-7546 Unknown
secalert@redhat.comMariner CVE-2025-49180 Unknown
cve@mitre.orgMariner CVE-2024-22653 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38063 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38191 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38190 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38198 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38212 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38211 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38160 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38153 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38159 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38173 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38167 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38262 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38259 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38280 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38283 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38282 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38227 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38213 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38226 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38249 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38229 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38000 Unknown
secalert_us@oracle.comMariner CVE-2025-50087 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38001 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38061 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38045 Unknown
36c7be3b-2937-45df-85ea-ca7133ea542cMariner CVE-2024-6484 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38034 Unknown
patrick@puiterwijk.orgMariner CVE-2024-7730 Unknown
secalert_us@oracle.comMariner CVE-2025-50080 Unknown
infosec@edk2.groups.ioMariner CVE-2023-45231 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38117 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38110 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38118 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38148 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38119 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38075 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38074 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38086 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38109 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38108 Unknown
secalert@redhat.comMariner CVE-2025-49176 Unknown
a59d8014-47c4-4630-ab43-e1b13cbe58e3Mariner CVE-2025-5455 Unknown
secalert@redhat.comMariner CVE-2025-49178 Unknown
cna@vuldb.comMariner CVE-2025-6140 Unknown
secalert@redhat.comMariner CVE-2025-49179 Unknown
secalert_us@oracle.comMariner CVE-2025-50098 Unknown
secalert_us@oracle.comMariner CVE-2025-50099 Unknown
secalert_us@oracle.comMariner CVE-2025-50104 Unknown
secalert@redhat.comMariner CVE-2025-7519 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2025-5025 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38048 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38035 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38051 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38059 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38058 Unknown
security-advisories@github.comMariner CVE-2024-27308 Unknown
security@apache.orgMariner CVE-2025-54090 Unknown
secalert@redhat.comMariner CVE-2025-4574 Unknown
openssl-security@openssl.orgMariner CVE-2022-1292 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-37958 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38337 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38336 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38345 Unknown
security-advisories@github.comMariner CVE-2025-49133 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38346 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38293 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38290 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38304 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38326 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38324 Unknown
secalert_us@oracle.comMariner CVE-2025-50083 Unknown
secalert_us@oracle.comMariner CVE-2025-50078 Unknown
secalert_us@oracle.comMariner CVE-2025-50086 Unknown
secalert_us@oracle.comMariner CVE-2025-50097 Unknown
secalert_us@oracle.comMariner CVE-2025-50092 Unknown
security-advisories@github.comMariner CVE-2025-50181 Unknown
cna@python.orgMariner CVE-2025-6069 Unknown
infosec@edk2.groups.ioMariner CVE-2023-45229 Unknown
secalert_us@oracle.comMariner CVE-2025-50077 Unknown
infosec@edk2.groups.ioMariner CVE-2024-38796 Unknown
MicrosoftMicrosoft 365 Copilot's Business Chat CVE-2025-53787 Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
MicrosoftMicrosoft 365 Copilot's Business Chat CVE-2025-53774 Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2025-53142 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Dynamics 365 (on-premises) CVE-2025-49745 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics 365 (on-premises) CVE-2025-53728 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8582 Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8580 Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8581 Chromium: CVE-2025-8581 Inappropriate implementation in Extensions
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8578 Chromium: CVE-2025-8578 Use after free in Cast
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8576 Chromium: CVE-2025-8576 Use after free in Extensions
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8577 Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8583 Chromium: CVE-2025-8583 Inappropriate implementation in Permissions
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8579 Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome
MicrosoftMicrosoft Edge for Android CVE-2025-49755 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
MicrosoftMicrosoft Edge for Android CVE-2025-49736 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-25005 Microsoft Exchange Server Tampering Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-25006 Microsoft Exchange Server Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-25007 Microsoft Exchange Server Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-53786 Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-33051 Microsoft Exchange Server Information Disclosure Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2025-49743 Windows Graphics Component Elevation of Privilege Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2025-50165 Windows Graphics Component Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-53732 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-53740 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-53731 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53759 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53737 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53739 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53735 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53741 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office PowerPoint CVE-2025-53761 Microsoft PowerPoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2025-53760 Microsoft SharePoint Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2025-49712 Microsoft SharePoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Visio CVE-2025-53730 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Visio CVE-2025-53734 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-53738 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-53736 Microsoft Word Information Disclosure Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-53784 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-53733 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Teams CVE-2025-53783 Microsoft Teams Remote Code Execution Vulnerability
MicrosoftRemote Access Point-to-Point Protocol (PPP) EAP-TLS CVE-2025-50159 Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability
MicrosoftRemote Desktop Server CVE-2025-50171 Remote Desktop Spoofing Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-50167 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-53155 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-49751 Windows Hyper-V Denial of Service Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-53723 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-48807 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2025-49758 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftSQL Server CVE-2025-24999 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftSQL Server CVE-2025-53727 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftSQL Server CVE-2025-49759 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftSQL Server CVE-2025-47954 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftStorage Port Driver CVE-2025-53156 Windows Storage Port Driver Information Disclosure Vulnerability
MicrosoftWeb Deploy CVE-2025-53772 Web Deploy Remote Code Execution Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53718 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53134 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-49762 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53147 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53154 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53137 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53141 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2025-50170 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
MicrosoftWindows Connected Devices Platform Service CVE-2025-53721 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
MicrosoftWindows DirectX CVE-2025-53135 DirectX Graphics Kernel Elevation of Privilege Vulnerability
MicrosoftWindows DirectX CVE-2025-50172 DirectX Graphics Kernel Denial of Service Vulnerability
MicrosoftWindows Distributed Transaction Coordinator CVE-2025-50166 Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability
MicrosoftWindows File Explorer CVE-2025-50154 Microsoft Windows File Explorer Spoofing Vulnerability
MicrosoftWindows GDI+ CVE-2025-53766 GDI+ Remote Code Execution Vulnerability
MicrosoftWindows Installer CVE-2025-50173 Windows Installer Elevation of Privilege Vulnerability
MicrosoftWindows Kerberos CVE-2025-53779 Windows Kerberos Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-49761 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-53151 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Local Security Authority Subsystem Service (LSASS) CVE-2025-53716 Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
MicrosoftWindows Media CVE-2025-53131 Windows Media Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2025-53145 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2025-53143 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2025-50177 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2025-53144 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows NT OS Kernel CVE-2025-53136 NT OS Kernel Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-50158 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTLM CVE-2025-53778 Windows NTLM Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-53133 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows Push Notifications CVE-2025-53725 Windows Push Notifications Apps Elevation of Privilege Vulnerability
MicrosoftWindows Push Notifications CVE-2025-53724 Windows Push Notifications Apps Elevation of Privilege Vulnerability
MicrosoftWindows Push Notifications CVE-2025-50155 Windows Push Notifications Apps Elevation of Privilege Vulnerability
MicrosoftWindows Push Notifications CVE-2025-53726 Windows Push Notifications Apps Elevation of Privilege Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2025-53722 Windows Remote Desktop Services Denial of Service Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50157 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53153 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50163 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50162 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50164 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53148 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53138 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50156 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-49757 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53719 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53720 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50160 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Security App CVE-2025-53769 Windows Security App Spoofing Vulnerability
MicrosoftWindows SMB CVE-2025-50169 Windows SMB Remote Code Execution Vulnerability
MicrosoftWindows StateRepository API CVE-2025-53789 Windows StateRepository API Server file Elevation of Privilege Vulnerability
MicrosoftWindows Subsystem for Linux CVE-2025-53788 Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2025-50161 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2025-53132 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2025-50168 Win32k Elevation of Privilege Vulnerability

CVE-2025-49751 - Windows Hyper-V Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49751
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.


FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to cause denial of service on the Hyper-V host environment.


According to the CVSS metric, the Hyper-V attack vector is adjacent (AV:A). What does that mean for this vulnerability?

Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines within the virtual network can only communicate with each other. In this attack vector, the vulnerable component is bound to the network stack, but the attack is limited to systems configured to use the HNV network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49751
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Denial of Service 5062560
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2016 5063871 (Security Update) Important Denial of Service 5062560
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Denial of Service 5062560
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Denial of Service 5062570
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49751 HongZhenhao with TianGong Team of Legendsec at Qi'anxin Group


CVE-2025-49745 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49745
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:L), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability).


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49745
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5059086 (Security Update) Important Spoofing Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
9.1.38.10
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49745 batram


batram


CVE-2025-49758 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49758
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker with explicit permissions could exploit the vulnerability by logging in to the SQL server and could then elevate their privileges to sysadmin.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49758
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 5063762 (Security Update) Important Elevation of Privilege 5058718
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.6465.1
Maybe None
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 5063761 (Security Update) Important Elevation of Privilege 5058717
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.7060.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 5063759 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.3500.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (GDR) 5063760 (Security Update) Important Elevation of Privilege 5058716
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.2080.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 5063757 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4440.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5063758 (Security Update) Important Elevation of Privilege 5058713
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2140.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49758 Chris Thompson with SpecterOps


CVE-2025-53727 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53727
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit the vulnerability?

An attacker could inject arbitrary T-SQL commands by crafting a malicious database name.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain sysadmin privileges.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53727
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 5063762 (Security Update) Important Elevation of Privilege 5058718
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.6465.1
Maybe None
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 5063761 (Security Update) Important Elevation of Privilege 5058717
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.7060.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 5063759 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.3500.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (GDR) 5063760 (Security Update) Important Elevation of Privilege 5058716
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.2080.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 5063757 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4440.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5063758 (Security Update) Important Elevation of Privilege 5058713
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2140.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53727 Fabiano Amorim with Pythian


CVE-2025-53729 - Microsoft Azure File Sync Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53729
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53729
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure File Sync v18.0 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.0.0.0
No None
Azure File Sync v19.0 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.1.0.0
No None
Azure File Sync v20.0 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20.0.0.0
No None
Azure File Sync v21.0 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
21.2.0.0
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53729 Michal Kamensky with Microsoft


CVE-2025-33051 - Microsoft Exchange Server Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-33051
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Microsoft Exchange Server allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is whether an email address exists on the server or not.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-33051
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5063223 (Security Update) Important Information Disclosure 5049233
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.01.2507.058
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5063222 (Security Update) Important Information Disclosure 5049233
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1544.033
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5063221 (Security Update) Important Information Disclosure 5049233
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1748.036
Yes None
Microsoft Exchange Server Subscription Edition RTM 5063224 (Security Update) Important Information Disclosure Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.2562.020
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-33051 Ben Sparks


CVE-2025-53730 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53730
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to be tricked into opening a malicious file in Visio.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53730
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53730 c0d3nh4ck with Zscaler's ThreatLabz


CVE-2025-53741 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53741
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53741
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53741 boolgombear & Jmini


CVE-2025-53759 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53759
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53759
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53759 Jmini with boolgombear


Jmini with boolgombear


CVE-2025-53760 - Microsoft SharePoint Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53760
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Server-side request forgery (ssrf) in Microsoft Office SharePoint allows an authorized attacker to elevate privileges over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H), and some loss of integrity (I:L) and no loss of availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could view sensitive information, a token in this scenario (Confidentiality), and make some changes to disclosed information (Integrity), but they would not be able to affect Availability.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user.


I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running?

Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53760
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002771 (Security Update) Important Elevation of Privilege 5002760
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.5513.1002
Maybe None
Microsoft SharePoint Server 2019 5002769 (Security Update) Important Elevation of Privilege 5002754
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.10417.20041
Maybe None
Microsoft SharePoint Server Subscription Edition 5002773 (Security Update) Important Elevation of Privilege 5002768
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.18526.20518
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53760 None

CVE-2025-53761 - Microsoft PowerPoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53761
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PowerPoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53761
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft PowerPoint 2016 (32-bit edition) 5002765 (Security Update) Important Remote Code Execution 5002746
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft PowerPoint 2016 (64-bit edition) 5002765 (Security Update) Important Remote Code Execution 5002746
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53761 Anonymous


CVE-2025-24999 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24999
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker with explicit permissions could exploit the vulnerability by logging in to the SQL server and could then elevate their privileges to sysadmin.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain sysadmin privileges.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24999
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 5063762 (Security Update) Important Elevation of Privilege 5058718
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.6465.1
Maybe None
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 5063761 (Security Update) Important Elevation of Privilege 5058717
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.7060.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 5063759 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.3500.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (GDR) 5063760 (Security Update) Important Elevation of Privilege 5058716
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.2080.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 5063757 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4440.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5063758 (Security Update) Important Elevation of Privilege 5058713
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2140.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24999 Emad Al-Mousa


CVE-2025-53772 - Web Deploy Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53772
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Web Deploy Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

An authenticated attacker could exploit the vulnerability by sending a malicious http request to the web server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53772
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Web Deploy 4.0 Release Notes (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.2001
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53772 Batuhan Er with HawkTrace


CVE-2025-53773 - GitHub Copilot and Visual Studio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53773
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: GitHub Copilot and Visual Studio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of this vulnerability requires that a user trigger the payload in the application.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53773
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2022 version 17.14 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.14.12
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53773 Johann Rehberger with https://embracethered.com/


Markus Vervier with Persistent Security Industries GmbH


CVE-2025-53781 - Azure Virtual Machines Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53781
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Virtual Machines Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Azure Virtual Machines allows an authorized attacker to disclose information over a network.


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53781
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
DCadsv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCasv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCedsv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCesv5-series - Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCesv6-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECadsv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECasv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECedsv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECesv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Ecesv6-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
NCCadsH100v5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53781 Microsoft Offensive Research & Security Engineering


CVE-2025-53786 - Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53786
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability within the organization’s cloud environment?

In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable trace. This risk arises because Exchange Server and Exchange Online share the same service principal in hybrid configurations.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this scenario, successfully exploiting the vulnerability could enable an attacker to escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable traces.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to first gain or possess administrator access on an Exchange Server.


Microsoft Exchange Server Subscription Edition RTM didn't exist in April when the hot fix was released. Why is it listed in the Security Updates Table?

Support for the dedicated Exchange hybrid app feature is already part of the initial release of the Exchange Server SE version. If you have already migrated to the newest version you already have this level of protection from the vulnerability. All you need to do is to follow the steps as outlined in the documentation to enable the feature and clear the certificates from the shared service principals keyCredentials.


What steps do I need to take to better protect my hybrid environment?

  1. If you're using Exchange hybrid, install the Hot Fix (or newer release) on your on-premises Exchange servers and follow the configuration instructions outlined in Deploy dedicated Exchange hybrid app. For additional details, refer to Exchange Server Security Changes for Hybrid Deployments. After completing the steps, be sure to reset the service principal's keyCredentials.

  2. If you’ve previously configured Exchange hybrid or OAuth authentication between Exchange Server and your Exchange Online organization but no longer use it, make sure to reset the service principal's keyCredentials.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53786
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5050674 (Security Update) Important Elevation of Privilege Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.01.2507.055
Maybe None
Microsoft Exchange Server 2019 Cumulative Update 14 5050673 (Security Update) Important Elevation of Privilege Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1544.025
Maybe None
Microsoft Exchange Server 2019 Cumulative Update 15 5050672 (Security Update) Important Elevation of Privilege Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1748.024
Maybe None
Microsoft Exchange Server Subscription Edition RTM 5047155 (Security Update) Important Elevation of Privilege Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.2562.017
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53786 Dirk-jan Mollema with Outsider Security


CVE-2025-8582 - Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8582
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8582
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8582 None

CVE-2025-8581 - Chromium: CVE-2025-8581 Inappropriate implementation in Extensions

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8581
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8581 Inappropriate implementation in Extensions
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8581
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8581 None

CVE-2025-8580 - Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8580
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8580
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8580 None

CVE-2025-8578 - Chromium: CVE-2025-8578 Use after free in Cast

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8578
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8578 Use after free in Cast
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8578
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8578 None

CVE-2025-8576 - Chromium: CVE-2025-8576 Use after free in Extensions

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8576
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8576 Use after free in Extensions
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8576
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8576 None

CVE-2025-25005 - Microsoft Exchange Server Tampering Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25005
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Tampering Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Microsoft Exchange Server allows an authorized attacker to perform tampering over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Tampering

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25005
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5063223 (Security Update) Important Tampering 5049233
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.01.2507.058
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5063222 (Security Update) Important Tampering 5049233
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1544.033
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5063221 (Security Update) Important Tampering 5049233
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1748.036
Yes None
Microsoft Exchange Server Subscription Edition RTM 5063224 (Security Update) Important Tampering Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.2562.020
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25005 None

CVE-2025-25006 - Microsoft Exchange Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25006
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper handling of additional special element in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

An attacker could spoof incorrect 5322.From email address that is displayed to a user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25006
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5063223 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.01.2507.058
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5063222 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.1544.033
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5063221 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.1748.036
Yes None
Microsoft Exchange Server Subscription Edition RTM 5063224 (Security Update) Important Spoofing Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.2562.020
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25006 Anna Breeva


CVE-2025-25007 - Microsoft Exchange Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25007
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

An attacker could spoof incorrect 5322.From email address that is displayed to a user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25007
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5063223 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.01.2507.058
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5063222 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.1544.033
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5063221 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.1748.036
Yes None
Microsoft Exchange Server Subscription Edition RTM 5063224 (Security Update) Important Spoofing Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.2562.020
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25007 None

CVE-2025-49743 - Windows Graphics Component Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49743
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with privileges could send controlled inputs to exploit this vulnerability.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49743
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49743 Anonymous


CVE-2025-49757 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49757
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49757
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5062624 (Monthly Rollup)
5062618 (Security Only)
Important Remote Code Execution 5061026
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23418
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5062624 (Monthly Rollup)
5062618 (Security Only)
Important Remote Code Execution 5061026
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23418
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5062624 (Monthly Rollup)
5062618 (Security Only)
Important Remote Code Execution 5061026
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23418
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5062624 (Monthly Rollup)
5062618 (Security Only)
Important Remote Code Execution 5061026
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23418
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5062632 (Monthly Rollup)
5062619 (Security Only)
Important Remote Code Execution 5061078
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27820
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5062632 (Monthly Rollup)
5062619 (Security Only)
Important Remote Code Execution 5061078
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27820
Yes None
Windows Server 2012 5062592 (Monthly Rollup) Important Remote Code Execution 5061059
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25573
Yes None
Windows Server 2012 (Server Core installation) 5062592 (Monthly Rollup) Important Remote Code Execution 5061059
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25573
Yes None
Windows Server 2012 R2 5062597 (Monthly Rollup) Important Remote Code Execution 5061018
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22676
Yes None
Windows Server 2012 R2 (Server Core installation) 5062597 (Monthly Rollup) Important Remote Code Execution 5061018
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22676
Yes None
Windows Server 2016 5062560 (Security Update) Important Remote Code Execution 5061010
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2016 (Server Core installation) 5062560 (Security Update) Important Remote Code Execution 5061010
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2019 5062557 (Security Update) Important Remote Code Execution 5060531
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2019 (Server Core installation) 5062557 (Security Update) Important Remote Code Execution 5060531
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2022 5062572 (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022 (Server Core installation) 5062572 (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5062570 (Security Update) Important Remote Code Execution 5060118
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1732
Yes None
Windows Server 2025 5062553 (Security Update) Important Remote Code Execution 5060842
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2025 (Server Core installation) 5062553 (Security Update) Important Remote Code Execution 5060842
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49757 Anonymous


CVE-2025-49759 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49759
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


How could an attacker exploit the vulnerability?

An attacker could inject arbitrary T-SQL commands by crafting a malicious database name.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49759
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 5063762 (Security Update) Important Elevation of Privilege 5058718
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.6465.1
Maybe None
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 5063761 (Security Update) Important Elevation of Privilege 5058717
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.7060.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 5063759 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.3500.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (GDR) 5063760 (Security Update) Important Elevation of Privilege 5058716
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.2080.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 5063757 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4440.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5063758 (Security Update) Important Elevation of Privilege 5058713
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2140.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49759 Anonymous


CVE-2025-49761 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49761
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49761
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49761 Anonymous


CVE-2025-49762 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49762
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49762
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49762 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-50153 - Desktop Windows Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50153
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Desktop Windows Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could an attacker gain with successful exploitation?

An attacker who successfully exploited this vulnerability could gain unauthorized access to system resources, potentially allowing them to perform actions with the same privileges as the compromised process.

This could lead to further system compromise and unauthorized actions within the network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50153
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50153 Varun Goel


CVE-2025-50154 - Microsoft Windows File Explorer Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50154
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to be tricked into opening a folder that contains a specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50154
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Spoofing 5062561
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Spoofing 5062561
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Spoofing 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Spoofing 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Spoofing 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Spoofing 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Spoofing 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Spoofing 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Spoofing 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Spoofing 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Spoofing 5062624
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Spoofing 5062624
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Spoofing 5062624
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Spoofing 5062624
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Spoofing 5062632
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Spoofing 5062632
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Spoofing 5062592
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Spoofing 5062592
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Spoofing 5062597
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Spoofing 5062597
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Spoofing 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Spoofing 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Spoofing 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Spoofing 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Spoofing 5062572
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Spoofing 5062572
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Spoofing 5062570
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50154 Ruben Enkaoua with Cymulate


CVE-2025-50156 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50156
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50156
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50156 Anonymous


CVE-2025-50158 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50158
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.3
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50158 Anonymous


CVE-2025-50159 - Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50159
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Remote Access Point-to-Point Protocol (PPP) EAP-TLS allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

An administrative user must be convinced to open a malicious COM object like an .rtf file.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50159 Hussein Aurbyae with Microsoft


CVE-2025-50160 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50160
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50160
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50160 Anonymous


CVE-2025-50161 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50161
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with privileges could send controlled inputs to exploit this vulnerability.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50161
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50161 Arnaud Lubin


CVE-2025-50162 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50162
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50162
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50162 Anonymous


CVE-2025-50163 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50163
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50163
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50163 Anonymous


CVE-2025-50164 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50164
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50164
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50164 Anonymous


CVE-2025-50165 - Windows Graphics Component Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50165
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Graphics Component Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, attack vector is (AV:N) and user interaction is none (UI:N). What does that mean for this vulnerability?

This can happen without user intervention. An attacker can use an uninitialized function pointer being called when decoding a JPEG image. This can be embedded in Office and 3rd party documents/files


How could an attacker exploit the vulnerability?

An attacker who successfully exploits this vulnerability could achieve remote code execution without user interaction.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50165 4n0nym4u5 with Zscaler


CVE-2025-50166 - Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50166
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50166
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50166 Anonymous


CVE-2025-50167 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50167
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50167
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50167 Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative


Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative


CVE-2025-50168 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50168
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50168
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50168 Hyeonjin Choi (@d4m0n_8) of Out Of Bounds with Trend Zero Day Initiative


CVE-2025-50169 - Windows SMB Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50169
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SMB Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50169
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50169 Anonymous


CVE-2025-50170 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50170
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper handling of insufficient permissions or privileges in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50170
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50170 Chen Le Qi (@cplearns2h4ck) with STAR Labs SG Pte. Ltd.


CVE-2025-50171 - Remote Desktop Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50171
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Desktop Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Missing authorization in Remote Desktop Server allows an unauthorized attacker to perform spoofing over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50171
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Spoofing 5062572
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Spoofing 5062572
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Spoofing 5062570
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50171 Philemon Orphee Favrod


Ray Reskusich with Microsoft


CVE-2025-50172 - DirectX Graphics Kernel Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50172
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Allocation of resources without limits or throttling in Windows DirectX allows an authorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50172
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Denial of Service 5062570
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50172 cyanbamboo and b2ahex


CVE-2025-50173 - Windows Installer Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50173
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Installer Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50173 JaGoTu with DCIT, a.s.


CVE-2025-50176 - DirectX Graphics Kernel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50176
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Graphics Kernel allows an authorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50176
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Critical Remote Code Execution 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50176 b2ahex


cyanbamboo


CVE-2025-50177 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50177
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker would need to send a series of specially crafted MSMQ packets in a rapid sequence over HTTP to a MSMQ server.

This could result in remote code execution on the server side.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50177
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Critical Remote Code Execution 5062561
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Critical Remote Code Execution 5062561
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Remote Code Execution 5062632
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Remote Code Execution 5062632
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Critical Remote Code Execution 5062592
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Critical Remote Code Execution 5062592
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Critical Remote Code Execution 5062597
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Critical Remote Code Execution 5062597
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Critical Remote Code Execution 5062570
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50177 Azure Yang with Kunlun Lab


CVE-2025-53131 - Windows Media Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53131
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution.


How could an attacker exploit this vulnerability?

An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53131
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53131 Kai Lu of Palo Alto Networks


CVE-2025-53132 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53132
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53132
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53132 goodbyeselene with Trend Zero Day Initiative


goodbyeselene with Trend Zero Day Initiative


Anonymous


goodbyeselene with Trend Zero Day Initiative


CVE-2025-53133 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53133
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53133
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53133 Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat


Dongjun Kim (smlijun) with Ajou University, and working at ENKI WhiteHat


Seongheun Hong (seongheunh) with Ajou University


Pwnforr777


Hwiwon Lee (hwiwonl), SEC-agent team


Taewoo (Tae_ω02)


CVE-2025-53134 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53134
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53134
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53134 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-53135 - DirectX Graphics Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53135
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53135
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53135 cyanbamboo and b2ahex


CVE-2025-53136 - NT OS Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53136
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NT OS Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53136
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53136 Bùi Quang Hiếu (@tykawaii98) with Crowdfense


CVE-2025-53137 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53137
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53137
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53137 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-53138 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53138
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53138
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53138 Anonymous


CVE-2025-53140 - Windows Kernel Transaction Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53140
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Transaction Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Kernel Transaction Manager allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53140
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53140 Anonymous


CVE-2025-53141 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53141
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53141
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53141 Marat Gayanov with Positive Technologies


CVE-2025-53142 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53142
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53142
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53142 ChenJian with Sea Security Orca Team


hazard


hazard


CVE-2025-53143 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53143
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53143
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53143 k0shl with Kunlun Lab


CVE-2025-53144 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53144
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53144
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53144 k0shl with Kunlun Lab


CVE-2025-53145 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53145
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53145
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53145 k0shl with Kunlun Lab


CVE-2025-53147 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53147
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53147
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53147 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-53148 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53148
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53148
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53148 Anonymous


CVE-2025-53149 - Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53149
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53149
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53149 Aleksandr Koshelev from Crowdfense


CVE-2025-53151 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53151
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53151
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53151 hazard


CVE-2025-53152 - Desktop Windows Manager Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53152
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Desktop Windows Manager Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Desktop Windows Manager allows an authorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word "Remote" in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to create a window and intentionally cause it to hang. This could be used to exploit the GhostWindow object use-after-free (UAF) vulnerability in the DWM process on the victim's system.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to have obtained low privileged code execution on target host first.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53152
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53152 Varun Goel


CVE-2025-53153 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53153
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53153
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53153 Anonymous


CVE-2025-53154 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53154
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53154
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53154 dungnm with Viettel Cyber Security


CVE-2025-53155 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53155
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker could create a crafted vhdx file and can call the vhdmp api with vhdx as one of the arguments.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53155
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53155 Do Manh Dung & Nguyen Dang Nguyen of STAR Labs SG Pte. Ltd. (@starlabs_sg) working with Trend Zero Day Initiative


Do Manh Dung & Nguyen Dang Nguyen of STAR Labs SG Pte. Ltd. (@starlabs_sg) working with Trend Zero Day Initiative


CVE-2025-53156 - Windows Storage Port Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53156
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Storage Port Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain kernel memory content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53156
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53156 Anonymous


DEVCORE - Angelboy (@scwuaptx) from DEVCORE Research Team with Trend Zero Day Initiative


CVE-2025-53716 - Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53716
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53716
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Denial of Service 5062570
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53716 Anonymous


CVE-2025-53718 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53718
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53718
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53718 dungnm with Viettel Cyber Security


CVE-2025-53719 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53719
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53719
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53719 Anonymous


CVE-2025-53720 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53720
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR:L). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an authorized attacker on the domain to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53720
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53720 Anonymous


CVE-2025-53721 - Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53721
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53721
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53721 Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute


CVE-2025-53722 - Windows Remote Desktop Services Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53722
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53722
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Denial of Service 5062561
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Denial of Service 5062561
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Denial of Service 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Denial of Service 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Denial of Service 5062632
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Denial of Service 5062632
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Denial of Service 5062592
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Denial of Service 5062592
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Denial of Service 5062597
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Denial of Service 5062597
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Denial of Service 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Denial of Service 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Denial of Service 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Denial of Service 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Denial of Service 5062570
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53722 Erik Egsgard with Field Effect


CVE-2025-53723 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53723
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Numeric truncation error in Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53723
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53723 Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative


pwnky


CVE-2025-53724 - Windows Push Notifications Apps Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53724
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.

Please refer to AppContainer isolation and Mandatory Integrity Control for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53724
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53724 Anonymous


Anonymous


CVE-2025-53725 - Windows Push Notifications Apps Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53725
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.

Please refer to AppContainer isolation and Mandatory Integrity Control for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53725
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53725 Anonymous


CVE-2025-53726 - Windows Push Notifications Apps Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53726
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.

Please refer to AppContainer isolation and Mandatory Integrity Control for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53726
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53726 anonymous


CVE-2025-53728 - Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53728
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53728
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5064483 (Security Update) Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
9.1.39
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53728 Ha Anh Hoang with Viettel Cyber Security


CVE-2025-47954 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-47954
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit the vulnerability?

An attacker could use the unsanitized parameter into a SQL query to trigger SQL Injection.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain sysadmin privileges.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-47954
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-47954 Fabiano Amorim with Pythian


CVE-2025-53731 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53731
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53731
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002756 (Security Update) Critical Remote Code Execution 5002742
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002756 (Security Update) Critical Remote Code Execution 5002742
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53731 0x140ce[LLMole]


CVE-2025-53732 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53732
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53732
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Office for Android Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.19127.20000
Maybe None
Microsoft Office for Universal Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.14326.22618
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53732 Arnaud Lubin


CVE-2025-53733 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53733
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53733
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft SharePoint Enterprise Server 2016 5002771 (Security Update)
5002772 (Security Update)
Critical Remote Code Execution 5002760

5002759
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1002
Maybe None
Microsoft SharePoint Server 2019 5002769 (Security Update)
5002770 (Security Update)
Critical Remote Code Execution 5002754

5002753
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20041
Maybe None
Microsoft Word 2016 (32-bit edition) 5002763 (Security Update) Critical Remote Code Execution 5002745
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Word 2016 (64-bit edition) 5002763 (Security Update) Critical Remote Code Execution 5002745
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53733 cdbb6164ddfda2b210fd348442322115


CVE-2025-53734 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53734
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to be tricked into opening a malicious file in Visio.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53734
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53734 c0d3nh4ck with Zscaler's ThreatLabz


CVE-2025-53735 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53735
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53735
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53735 wh1tc & Zhiniang Peng with HUST


CVE-2025-53736 - Microsoft Word Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53736
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53736
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft SharePoint Enterprise Server 2016 5002771 (Security Update)
5002772 (Security Update)
Important Information Disclosure 5002760

5002759
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.0.5513.1002
Maybe None
Microsoft SharePoint Server 2019 5002769 (Security Update)
5002770 (Security Update)
Important Information Disclosure 5002754

5002753
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.0.10417.20041
Maybe None
Microsoft Word 2016 (32-bit edition) 5002763 (Security Update) Important Information Disclosure 5002745
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Word 2016 (64-bit edition) 5002763 (Security Update) Important Information Disclosure 5002745
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53736 wh1tc in Kunlun lab, devoke, Zhiniang Peng with HUST


wh1tc in Kunlun lab, devoke, Zhiniang Peng with HUST


CVE-2025-53737 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53737
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53737
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53737 wh1tc in Kunlun lab & devoke & Zhiniang Peng with HUST


CVE-2025-53738 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53738
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53738
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Word 2016 (32-bit edition) 5002763 (Security Update) Important Remote Code Execution 5002745
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Word 2016 (64-bit edition) 5002763 (Security Update) Important Remote Code Execution 5002745
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53738 Haifei Li with EXPMON


CVE-2025-53739 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53739
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53739
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53739 wh1tc in Kunlun lab, devoke & Zhiniang Peng with HUST


wh1tc in Kunlun lab, devoke & Zhiniang Peng with HUST


CVE-2025-53740 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53740
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53740
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002756 (Security Update) Critical Remote Code Execution 5002742
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002756 (Security Update) Critical Remote Code Execution 5002742
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53740 Li Shuang and willJ with Vulnerability Research Institute


CVE-2025-53765 - Azure Stack Hub Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53765
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Stack Hub Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

This vulnerability could disclose administrator account passwords in the logs.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53765
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Stack Hub Release Notes (Security Update) Important Information Disclosure Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
102.10.2.11
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53765 Anonymous


CVE-2025-53766 - GDI+ Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53766
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: GDI+ Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the privilege required is none (PR:N) and user interaction is none (UI:N). What does that mean for this vulnerability?

An attacker doesn't require any privileges on the systems hosting the web services. Successful exploitation of this vulnerability could cause Remote Code Execution or Information Disclosure on web services that are parsing documents that contain a specially crafted metafile, without the involvement of a victim user.


According to the CVSS metric, the attack vector is network (AV:N). How could an attacker exploit the vulnerability?

An attacker could trigger this vulnerability by convincing a victim to download and open a document that contains a specially crafted metafile. In the worst-case scenario, an attacker could trigger this vulnerability on web services by uploading documents containing a specially crafted metafile (AV:N) without user interaction. When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53766
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Office for Android Release Notes (Security Update) Critical Remote Code Execution Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.19127.20000
Maybe None
Microsoft Office for Universal Release Notes (Security Update) Critical Remote Code Execution Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.14326.22618
Maybe None
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Critical Remote Code Execution 5062561
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Critical Remote Code Execution 5062561
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Remote Code Execution 5062632
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Remote Code Execution 5062632
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Critical Remote Code Execution 5062592
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Critical Remote Code Execution 5062592
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Critical Remote Code Execution 5062597
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Critical Remote Code Execution 5062597
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Critical Remote Code Execution 5062570
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53766 Gábor Selján with Check Point Research


CVE-2025-53769 - Windows Security App Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53769
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Security App Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53769
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Security App (Security Update) Important Spoofing Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1000.27840.1000.0
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53769 Jimmy Bayne of IBM X-Force


CVE-2025-50157 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50157
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR:L). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an authorized attacker on the domain to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50157 Anonymous


CVE-2025-50155 - Windows Push Notifications Apps Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50155
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited the vulnerability could elevate from a low integrity level up to a medium integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50155
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50155 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-53778 - Windows NTLM Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53778
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTLM Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53778
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Critical Elevation of Privilege 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Critical Elevation of Privilege 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Critical Elevation of Privilege 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Critical Elevation of Privilege 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Critical Elevation of Privilege 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Critical Elevation of Privilege 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Critical Elevation of Privilege 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Critical Elevation of Privilege 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Critical Elevation of Privilege 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Critical Elevation of Privilege 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Elevation of Privilege 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Elevation of Privilege 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Elevation of Privilege 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Elevation of Privilege 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Elevation of Privilege 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Elevation of Privilege 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Critical Elevation of Privilege 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Critical Elevation of Privilege 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Critical Elevation of Privilege 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Critical Elevation of Privilege 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Critical Elevation of Privilege 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Critical Elevation of Privilege 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Critical Elevation of Privilege 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Critical Elevation of Privilege 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Critical Elevation of Privilege 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53778 Tianze Ding (@D1iv3)


CVE-2025-53779 - Windows Kerberos Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53779
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network.


FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

To successfully exploit this vulnerability, an attacker would need to have elevated access to certain attributes of the dMSA, specifically:

  • msds-groupMSAMembership: This attribute allows the user to utilize the dMSA.
  • msds-ManagedAccountPrecededByLink: The attacker needs write access to this attribute, which allows them to specify a user that the dMSA can act on behalf of.

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain domain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Moderate Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53779
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Moderate Elevation of Privilege 5062553
Base: 7.2
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Moderate Elevation of Privilege 5062553
Base: 7.2
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53779 Yuval Gordon with Akamai


CVE-2025-53783 - Microsoft Teams Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53783
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Teams Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53783
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Teams for Android Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1416/1.0.0.2025102802
Maybe None
Microsoft Teams for Desktop Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
25122.1415.3698.6812
Maybe None
Microsoft Teams for iOS Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
7.10.1 (100772025102901)
Maybe None
Microsoft Teams for Mac Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
25122.1207.3700.1444
No None
Teams for D365 Guides Hololens Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
907.2505.29001.0
Maybe None
Teams for D365 Remote Assist HoloLens Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
316.2505.28001
Maybe None
Teams Panels Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1449/1.0.97.2025102203
Maybe None
Teams Phones Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1449/1.0.94.2025168802
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53783 Anonymous working with Trend Zero Day Initiative


CVE-2025-53784 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53784
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53784
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53784 Haifei Li with EXPMON


CVE-2025-53788 - Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53788
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53788
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Subsystem for Linux (WSL2) Release Notes (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.5.10
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53788 Nitesh Surana (niteshsurana.com) and Nelson William Gamazo Sanchez of Trend Research with Trend Micro


CVE-2025-53789 - Windows StateRepository API Server file Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53789
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows StateRepository API Server file Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Missing authentication for critical function in Windows StateRepository API allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53789
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5062561 (Security Update) Important Elevation of Privilege 5060998
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21073
Yes None
Windows 10 for x64-based Systems 5062561 (Security Update) Important Elevation of Privilege 5060998
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21073
Yes None
Windows 10 Version 1607 for 32-bit Systems 5062560 (Security Update) Important Elevation of Privilege 5061010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows 10 Version 1607 for x64-based Systems 5062560 (Security Update) Important Elevation of Privilege 5061010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows 10 Version 1809 for 32-bit Systems 5062557 (Security Update) Important Elevation of Privilege 5060531
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows 10 Version 1809 for x64-based Systems 5062557 (Security Update) Important Elevation of Privilege 5060531
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 21H2 for x64-based Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 22H2 for x64-based Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5062552 (Security Update) Important Elevation of Privilege 5060999
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5624
Yes None
Windows 11 Version 22H2 for x64-based Systems 5062552 (Security Update) Important Elevation of Privilege 5060999
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5062552 (Security Update) Important Elevation of Privilege 5060999
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5624
Yes None
Windows 11 Version 23H2 for x64-based Systems 5062552 (Security Update) Important Elevation of Privilege 5060999
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5062553 (Security Update) Important Elevation of Privilege 5060842
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows 11 Version 24H2 for x64-based Systems 5062553 (Security Update) Important Elevation of Privilege 5060842
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2016 5062560 (Security Update) Important Elevation of Privilege 5061010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2016 (Server Core installation) 5062560 (Security Update) Important Elevation of Privilege 5061010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2019 5062557 (Security Update) Important Elevation of Privilege 5060531
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2019 (Server Core installation) 5062557 (Security Update) Important Elevation of Privilege 5060531
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2022 5062572 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022 (Server Core installation) 5062572 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5062570 (Security Update) Important Elevation of Privilege 5060118
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1732
Yes None
Windows Server 2025 5062553 (Security Update) Important Elevation of Privilege 5060842
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2025 (Server Core installation) 5062553 (Security Update) Important Elevation of Privilege 5060842
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53789 R4nger with CyberKunLun & Zhiniang Peng with HUST


CVE-2025-53793 - Azure Stack Hub Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53793
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Stack Hub Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

System internal configuration could be disclosed by this vulnerability.


What should users do to protect themselves?

Users can follow the instructions in the release notes to update the Azure Stack Hub environment to latest version 1.2501.1.47.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53793
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Stack Hub 2406 Release Notes (Security Update)
Release Notes (Security Update)
Critical Information Disclosure Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.2406.1.23
No None
Azure Stack Hub 2408 Release Notes (Security Update)
Release Notes (Security Update)
Critical Information Disclosure Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.2408.1.50
No None
Azure Stack Hub 2501 Release Notes (Security Update)
Release Notes (Security Update)
Critical Information Disclosure Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.2501.1.47
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53793 nxhoang99 with VCSLab of Viettel Cyber Security


CVE-2025-8583 - Chromium: CVE-2025-8583 Inappropriate implementation in Permissions

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8583
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8583 Inappropriate implementation in Permissions
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8583
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8583 None

CVE-2025-8579 - Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8579
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8579
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8579 None

CVE-2025-8577 - Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8577
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8577
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8577 None

CVE-2025-48807 - Windows Hyper-V Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-48807
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

A race condition is triggered when the admin begins administering from the host system and not a guest or nested guest.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

At the time the authorized attacker sends a specially crafted request an administrator needs to take action on the host.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An attacker on a nested guest VM who successfully exploited the vulnerability could escape their VM and gain admin privilege on the guest that is serving as the host.

For diagrams and more detailed information about nested VMs please see Run Hyper-V in a Virtual Machine with Nested Virtualization.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-48807
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for x64-based Systems 5062560 (Security Update) Critical Remote Code Execution 5061010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows 10 Version 1809 for x64-based Systems 5062557 (Security Update) Critical Remote Code Execution 5060531
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows 10 Version 21H2 for x64-based Systems 5062554 (Security Update) Critical Remote Code Execution 5060533
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 22H2 for x64-based Systems 5062554 (Security Update) Critical Remote Code Execution 5060533
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5062552 (Security Update) Critical Remote Code Execution 5060999
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 22H2 for x64-based Systems 5062552 (Security Update) Critical Remote Code Execution 5060999
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5062552 (Security Update) Critical Remote Code Execution 5060999
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 23H2 for x64-based Systems 5062552 (Security Update) Critical Remote Code Execution 5060999
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5062553 (Security Update) Critical Remote Code Execution 5060842
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows 11 Version 24H2 for x64-based Systems 5062553 (Security Update) Critical Remote Code Execution 5060842
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2016 5062560 (Security Update) Critical Remote Code Execution 5061010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2016 (Server Core installation) 5062560 (Security Update) Critical Remote Code Execution 5061010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2019 5062557 (Security Update) Critical Remote Code Execution 5060531
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2019 (Server Core installation) 5062557 (Security Update) Critical Remote Code Execution 5060531
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2022 5062572 (Security Update) Critical Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022 (Server Core installation) 5062572 (Security Update) Critical Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5062570 (Security Update) Critical Remote Code Execution 5060118
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1732
Yes None
Windows Server 2025 5062553 (Security Update) Critical Remote Code Execution 5060842
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2025 (Server Core installation) 5062553 (Security Update) Critical Remote Code Execution 5060842
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-48807

QWangWang & zcgonvh


CVE-2025-53792 - Azure Portal Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53792
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Portal Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53792
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Portal Critical Elevation of Privilege None Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53792 nxhoang99 with VCSLab of Viettel Cyber Security


CVE-2025-53767 - Azure OpenAI Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53767
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure OpenAI Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:10.0/TemporalScore:8.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
N/A No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53767
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Open AI Critical Elevation of Privilege None Base: 10.0
Temporal: 8.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53767 Daniel Santos with Microsoft


CVE-2025-53774 - Microsoft 365 Copilot BizChat Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53774
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Critical Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53774
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Copilot's Business Chat Critical Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53774 Jun Kokatsu


CVE-2025-53787 - Microsoft 365 Copilot BizChat Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53787
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Critical Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
N/A No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53787
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Copilot's Business Chat Critical Information Disclosure None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53787 Luke Papandrea, Microsoft Corporation


CVE-2025-49755 - Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49755
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

An attacker using either a specially-crafted page or a content script injected into a target page can show an extension's popup over a permission prompt or screen share dialog allowing the extension to spoof parts of the prompt's UI that shows its origin.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Low Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49755
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge for Android Release Notes (Security Update) Low Spoofing Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49755 Farras Givari with Meta4sec


CVE-2025-49707 - Azure Virtual Machines Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49707
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Virtual Machines Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.9/TemporalScore:6.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Azure Virtual Machines allows an authorized attacker to perform spoofing locally.


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49707
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
DCadsv5-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCasv5-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCedsv5-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCesv5-series - Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCesv6-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECadsv5-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECasv5-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECedsv5-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECesv5-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Ecesv6-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
NCCadsH100v5-series Azure VM Critical Spoofing None Base: 7.9
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49707 Ming-Wei Shih with Microsoft


Ahmad Abdullateef with Microsoft


CVE-2025-49712 - Microsoft SharePoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49712
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability?

The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


How could an attacker exploit the vulnerability?

In a network-based attack, an attacker authenticated as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server.


I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running?

Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49712
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002771 (Security Update) Important Remote Code Execution 5002760
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1002
Maybe None
Microsoft SharePoint Server 2019 5002769 (Security Update) Important Remote Code Execution 5002754
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20041
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49712 Railgun with Kunlun Lab


CVE-2025-49736 - Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49736
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Moderate Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49736
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge for Android Release Notes (Security Update) Moderate Spoofing Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49736 Alwi Al Hadad with Meta4sec - Komunitas Siber UNM


CVE-2024-6484 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6484
MITRE
NVD

Issuing CNA: 36c7be3b-2937-45df-85ea-ca7133ea542c

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-25    

Information published.


1.1    01-Aug-25    

Added reaper to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6484
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM reaper (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.1.1-19
Unknown None
CBL Mariner 2.0 x64 reaper (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.1.1-19
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6484 None

CVE-2024-7730 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7730
MITRE
NVD

Issuing CNA: patrick@puiterwijk.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-May-25    

Information published.


1.1    05-Aug-25    

Added qemu to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7730
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM qemu (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.2.0-14
Unknown None
Azure Linux 3.0 x64 qemu (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.2.0-14
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7730 None

CVE-2023-45231 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-45231
MITRE
NVD

Issuing CNA: infosec@edk2.groups.io

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-24    

Information published.


1.1    30-Jun-24    

Information published.


2.0    06-Aug-25    

Added edk2 to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-45231
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM edk2 (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
20240223gitedc6681206c1-1
Unknown None
Azure Linux 3.0 x64 edk2 (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
20240223gitedc6681206c1-1
Unknown None
CBL Mariner 2.0 ARM edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
20230301gitf80f052277c8-42

1.0.1-3
None
CBL Mariner 2.0 x64 edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
20230301gitf80f052277c8-42

1.0.1-3
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-45231 None

CVE-2025-50080 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50080
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50080
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50080 None

CVE-2025-50087 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50087
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50087
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50087 None

CVE-2025-38000 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38000
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38000
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38000 None

CVE-2025-38001 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38001
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38001
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38001 None

CVE-2025-38045 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38045
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38045
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38045 None

CVE-2025-38061 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38061
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38061
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38061 None

CVE-2025-38074 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38074
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38074
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38074 None

CVE-2025-38075 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38075
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38075
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38075 None

CVE-2025-38086 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38086
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38086
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38086 None

CVE-2025-38108 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38108
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38108
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38108 None

CVE-2025-38109 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38109
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38109
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38109 None

CVE-2025-38110 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38110
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38110
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38110 None

CVE-2025-38117 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38117
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38117
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38117 None

CVE-2025-38118 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38118
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38118
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38118 None

CVE-2025-38119 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38119
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38119
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38119 None

CVE-2025-38148 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38148
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38148
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38148 None

CVE-2025-38153 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38153
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38153
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38153 None

CVE-2025-38160 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38160
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38160
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38160 None

CVE-2025-38159 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38159
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38159 None

CVE-2025-38167 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38167
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38167
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38167 None

CVE-2025-38173 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38173
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38173 None

CVE-2025-38190 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38190
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38190
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38190 None

CVE-2025-38191 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38191
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38191
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38191 None

CVE-2025-38198 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38198
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38198
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38198 None

CVE-2025-38211 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38211
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38211
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38211 None

CVE-2025-38212 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38212
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38212
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38212 None

CVE-2025-38213 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38213
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38213
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38213 None

CVE-2025-38227 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38227
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38227
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38227 None

CVE-2025-38226 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38226
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38226
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38226 None

CVE-2025-38229 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38229
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38229
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38229 None

CVE-2025-38249 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38249
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38249
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38249 None

CVE-2025-38259 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38259
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38259
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38259 None

CVE-2025-38262 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38262
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38262
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38262 None

CVE-2025-38280 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38280
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38280
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38280 None

CVE-2025-38282 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38282
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38282
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38282 None

CVE-2025-38283 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38283
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38283
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38283 None

CVE-2025-38290 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38290
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38290
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38290 None

CVE-2025-38293 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38293
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38293
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38293 None

CVE-2025-38304 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38304
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38304
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38304 None

CVE-2025-38324 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38324
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38324
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38324 None

CVE-2025-38326 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38326
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38326
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38326 None

CVE-2025-38336 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38336
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38336
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38336 None

CVE-2025-38337 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38337
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38337
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38337 None

CVE-2025-38345 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38345
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38345
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38345 None

CVE-2025-38346 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38346
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38346
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38346 None

CVE-2025-49133 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49133
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49133
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libtpms (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
0.9.6-8
Unknown None
Azure Linux 3.0 x64 libtpms (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H
0.9.6-8
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49133 None

CVE-2025-6069 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-6069
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Jul-25    

Information published.


2.0    07-Aug-25    

Added python3 to Azure Linux 3.0 Added python3 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-6069
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.12.9-3
Unknown None
Azure Linux 3.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.12.9-3
Unknown None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.9.19-14
Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.9.19-14
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-6069 None

CVE-2025-50181 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50181
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Jul-25    

Information published.


2.0    07-Aug-25    

Added python-urllib3 to Azure Linux 3.0 Added python3 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50181
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-urllib3 (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
2.0.7-2
Unknown None
Azure Linux 3.0 x64 python-urllib3 (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
2.0.7-2
Unknown None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
3.9.19-14
Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
3.9.19-14
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50181 None

CVE-2023-45229 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-45229
MITRE
NVD

Issuing CNA: infosec@edk2.groups.io

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-24    

Information published.


1.1    30-Jun-24    

Information published.


2.0    06-Aug-25    

Added edk2 to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-45229
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM edk2 (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
20240223gitedc6681206c1-1
Unknown None
Azure Linux 3.0 x64 edk2 (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
20240223gitedc6681206c1-1
Unknown None
CBL Mariner 2.0 ARM edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
20230301gitf80f052277c8-42

1.0.1-3
None
CBL Mariner 2.0 x64 edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
20230301gitf80f052277c8-42

1.0.1-3
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-45229 None

CVE-2024-38796 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38796
MITRE
NVD

Issuing CNA: infosec@edk2.groups.io

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityHigh
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    27-May-25    

Information published.


2.0    06-Aug-25    

Added edk2 to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38796
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM edk2 (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
20240524git3e722403cd16-8
Unknown None
Azure Linux 3.0 x64 edk2 (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
20240524git3e722403cd16-8
Unknown None
CBL Mariner 2.0 ARM edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
20230301gitf80f052277c8-42

1.0.1-13
None
CBL Mariner 2.0 x64 edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
20230301gitf80f052277c8-42

1.0.1-13
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38796 None

CVE-2025-50077 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50077
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50077
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50077 None

CVE-2025-50078 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50078
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50078
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50078 None

CVE-2025-50083 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50083
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50083 None

CVE-2025-50086 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50086
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50086
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50086 None

CVE-2025-50092 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50092
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50092
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50092 None

CVE-2025-50097 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50097
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50097
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50097 None

CVE-2025-50099 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50099
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50099
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50099 None

CVE-2025-50098 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50098
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:2.7/TemporalScore:2.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50098
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 2.7
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 2.7
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50098 None

CVE-2025-50104 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50104
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:2.7/TemporalScore:2.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50104
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 2.7
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 2.7
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50104 None

CVE-2025-5025 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-5025
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-5025
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-5025 None

CVE-2025-7519 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-7519
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:6.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-7519
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM polkit (CBL-Mariner) Unknown Unknown Base: 6.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
123-3
Unknown None
Azure Linux 3.0 x64 polkit (CBL-Mariner) Unknown Unknown Base: 6.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
123-3
Unknown None
CBL Mariner 2.0 ARM polkit (CBL-Mariner) Unknown Unknown Base: 6.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.119-4
Unknown None
CBL Mariner 2.0 x64 polkit (CBL-Mariner) Unknown Unknown Base: 6.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.119-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-7519 None

CVE-2025-5455 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-5455
MITRE
NVD

Issuing CNA: a59d8014-47c4-4630-ab43-e1b13cbe58e3

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-5455
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM qtbase (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.3-4
Unknown None
Azure Linux 3.0 x64 qtbase (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.3-4
Unknown None
CBL Mariner 2.0 ARM qt5-qtbase (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.12.11-18
Unknown None
CBL Mariner 2.0 x64 qt5-qtbase (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
5.12.11-18
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-5455 None

CVE-2025-49176 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49176
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49176
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1.20.10-16
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
1.20.10-16
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49176 None

CVE-2025-49178 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49178
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49178
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
24.1.6-2
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
24.1.6-2
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.20.10-16
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.20.10-16
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49178 None

CVE-2025-49179 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49179
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49179
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
24.1.6-2
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
24.1.6-2
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.20.10-16
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.20.10-16
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49179 None

CVE-2025-6140 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-6140
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-6140
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM doxygen (CBL-Mariner) Unknown Unknown Base: 3.3
Temporal: 3.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.9.8-2
Unknown None
Azure Linux 3.0 x64 doxygen (CBL-Mariner) Unknown Unknown Base: 3.3
Temporal: 3.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.9.8-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-6140 None

CVE-2025-54090 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-54090
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


2.0    07-Aug-25    

Added httpd to CBL-Mariner 2.0 Added httpd to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-54090
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM httpd (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2.4.65-1
Unknown None
Azure Linux 3.0 x64 httpd (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2.4.65-1
Unknown None
CBL Mariner 2.0 ARM httpd (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2.4.65-1
Unknown None
CBL Mariner 2.0 x64 httpd (CBL-Mariner) Unknown Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2.4.65-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-54090 None

CVE-2024-27308 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-27308
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Mar-24    

Information published.


1.1    30-Jun-24    

Information published.


2.0    06-Aug-25    

Added kata-containers to Azure Linux 3.0 Added rpm-ostree to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-27308
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kata-containers (CBL-Mariner)
rpm-ostree (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3.18.0.kata0-1

2024.4-1
None
Azure Linux 3.0 x64 kata-containers (CBL-Mariner)
rpm-ostree (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3.18.0.kata0-1

2024.4-1
None
CBL Mariner 2.0 ARM kata-containers (CBL-Mariner)
kata-containers-cc (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3.2.0.azl2-1
None
CBL Mariner 2.0 x64 kata-containers (CBL-Mariner)
kata-containers-cc (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3.2.0.azl2-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-27308 None

CVE-2025-4574 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-4574
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Jul-25    

Information published.


2.0    06-Aug-25    

Added kata-containers to Azure Linux 3.0 Added rust to Azure Linux 3.0 Added azl-compliance to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-4574
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kata-containers (CBL-Mariner)
rust (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
3.18.0.kata0-1

1.86.0-3
None
Azure Linux 3.0 x64 kata-containers (CBL-Mariner)
rust (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
3.18.0.kata0-1

1.86.0-3
None
CBL Mariner 2.0 ARM azl-compliance (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1.0.2-2
Unknown None
CBL Mariner 2.0 x64 azl-compliance (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1.0.2-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-4574 None

CVE-2025-37958 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-37958
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-37958
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-37958 None

CVE-2025-38034 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38034
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38034
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38034 None

CVE-2025-38035 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38035
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38035
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38035 None

CVE-2025-38048 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38048
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38048
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38048 None

CVE-2025-38051 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38051
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38051
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38051 None

CVE-2025-38058 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38058
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38058
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38058 None

CVE-2025-38059 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38059
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38059
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38059 None

CVE-2025-38063 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38063
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38063
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38063 None

CVE-2025-38065 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38065
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38065
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38065 None

CVE-2025-38078 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38078
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38078
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38078 None

CVE-2025-38081 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38081
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38081
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38081 None

CVE-2025-38088 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38088
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38088
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38088 None

CVE-2025-38090 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38090
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38090
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38090 None

CVE-2025-38102 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38102
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38102
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38102 None

CVE-2025-38103 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38103
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38103
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38103 None

CVE-2025-38113 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38113
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38113
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38113 None

CVE-2025-38127 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38127
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38127
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38127 None

CVE-2025-38135 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38135
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38135
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38135 None

CVE-2025-38136 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38136
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38136
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38136 None

CVE-2025-38143 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38143
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38143
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38143 None

CVE-2025-38146 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38146
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38146
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38146 None

CVE-2025-38161 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38161
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38161
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38161 None

CVE-2025-38183 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38183
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38183
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38183 None

CVE-2025-38185 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38185
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38185
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38185 None

CVE-2025-38194 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38194
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38194
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38194 None

CVE-2025-38197 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38197
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38197
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38197 None

CVE-2025-38218 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38218
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38218
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38218 None

CVE-2025-38220 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38220
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38220
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38220 None

CVE-2025-38222 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38222
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38222
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38222 None

CVE-2025-38251 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38251
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38251
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38251 None

CVE-2025-38257 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38257
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38257
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38257 None

CVE-2025-38258 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38258
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38258
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38258 None

CVE-2025-38277 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38277
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38277
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38277 None

CVE-2025-38300 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38300
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38300
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38300 None

CVE-2025-38305 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38305
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38305
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38305 None

CVE-2023-26819 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-26819
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:2.9/TemporalScore:2.9
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-26819
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libglvnd (CBL-Mariner) Unknown Unknown Base: 2.9
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1.7.0-3
Unknown None
Azure Linux 3.0 x64 libglvnd (CBL-Mariner) Unknown Unknown Base: 2.9
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1.7.0-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-26819 None

CVE-2025-38321 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38321
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38321
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38321 None

CVE-2025-38331 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38331
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38331
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38331 None

CVE-2024-2955 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2955
MITRE
NVD

Issuing CNA: cve@gitlab.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-25    

Information published.


1.1    07-Aug-25    

Added wireshark to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2955
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM wireshark (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.4.7-1
Unknown None
Azure Linux 3.0 x64 wireshark (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.4.7-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2955 None

CVE-2025-53023 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53023
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53023
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53023 None

CVE-2025-38363 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38363
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38363
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38363 None

CVE-2025-38416 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38416
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38416
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38416 None

CVE-2025-38424 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38424
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38424
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38424 None

CVE-2024-48916 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-48916
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Aug-25    

Information published.


2.0    11-Aug-25    

Added ceph to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-48916
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Unknown Unknown None
CBL Mariner 2.0 ARM ceph (CBL-Mariner) Unknown Unknown Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
16.2.10-9
Unknown None
CBL Mariner 2.0 x64 ceph (CBL-Mariner) Unknown Unknown Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
16.2.10-9
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-48916 None

CVE-2025-4948 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-4948
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-4948
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libsoup (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.4.4-8
Unknown None
Azure Linux 3.0 x64 libsoup (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.4.4-8
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-4948 None

CVE-2025-1550 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1550
MITRE
NVD

Issuing CNA: cve-coordination@google.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Mar-25    

Information published.


1.1    01-Aug-25    

Added keras to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1550
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM keras (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.3.3-2
Unknown None
Azure Linux 3.0 x64 keras (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.3.3-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1550 None

CVE-2024-4853 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4853
MITRE
NVD

Issuing CNA: cve@gitlab.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-25    

Information published.


1.1    05-Aug-25    

Added wireshark to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4853
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM wireshark (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.4.7-1
Unknown None
Azure Linux 3.0 x64 wireshark (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.4.7-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4853 None

CVE-2024-43806 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43806
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    21-Dec-24    

Information published.


2.0    11-Feb-25    

Information published.


3.0    27-Mar-25    

Information published.


4.0    29-Apr-25    

Information published.


5.0    06-May-25    

Information published.


6.0    11-Jul-25    

Added cloud-hypervisor to CBL-Mariner 2.0 Added virtiofsd to CBL-Mariner 2.0 Added rust to CBL-Mariner 2.0 Added virtiofsd to Azure Linux 3.0 Added flux to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0


7.0    06-Aug-25    

Added kata-containers-cc to CBL-Mariner 2.0 Added cloud-hypervisor to CBL-Mariner 2.0 Added virtiofsd to CBL-Mariner 2.0 Added rust to CBL-Mariner 2.0 Added virtiofsd to Azure Linux 3.0 Added flux to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43806
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM flux (CBL-Mariner)
kata-containers (CBL-Mariner)
kata-containers-cc (CBL-Mariner)
virtiofsd (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.194.5-2

3.2.0.azl4-1
1.8.0-3
None
Azure Linux 3.0 x64 flux (CBL-Mariner)
kata-containers (CBL-Mariner)
kata-containers-cc (CBL-Mariner)
virtiofsd (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
0.194.5-2

3.2.0.azl4-1
1.8.0-3
None
CBL Mariner 2.0 ARM cloud-hypervisor (CBL-Mariner)
kata-containers-cc (CBL-Mariner)
rust (CBL-Mariner)
virtiofsd (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
32.0-7

3.2.0.azl2-7
1.72.0-9
1.8.0-3
None
CBL Mariner 2.0 x64 cloud-hypervisor (CBL-Mariner)
kata-containers-cc (CBL-Mariner)
rust (CBL-Mariner)
virtiofsd (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
32.0-7

3.2.0.azl2-7
1.72.0-9
1.8.0-3
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43806 None

CVE-2025-4947 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-4947
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-25    

Information published.


2.0    06-Aug-25    

Added mysql to CBL-Mariner 2.0 Added cmake to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-4947
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
3.30.3-7
Unknown None
Azure Linux 3.0 x64 cmake (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
3.30.3-7
Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-4947 None

CVE-2025-4748 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-4748
MITRE
NVD

Issuing CNA: 6b3ad84c-e1a6-4bf7-a703-f496b71e49db

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-4748
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM erlang (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
25.3.2.21-2
Unknown None
CBL Mariner 2.0 x64 erlang (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
25.3.2.21-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-4748 None

CVE-2025-50091 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50091
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50091
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50091 None

CVE-2025-7545 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-7545
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-7545
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2.41-7
Unknown None
Azure Linux 3.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2.41-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-7545 None

CVE-2025-38004 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38004
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38004 None

CVE-2025-38039 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38039
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38039
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38039 None

CVE-2025-38044 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38044
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38044
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38044 None

CVE-2025-38068 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38068
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38068
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38068 None

CVE-2025-38071 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38071
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38071
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38071 None

CVE-2025-38072 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38072
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38072
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38072 None

CVE-2025-38079 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38079
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38079
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38079 None

CVE-2025-38083 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38083
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38083 None

CVE-2025-38085 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38085
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38085
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38085 None

CVE-2025-38089 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38089
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38089
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38089 None

CVE-2025-38097 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38097
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38097
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38097 None

CVE-2025-38100 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38100
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38100
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38100 None

CVE-2025-38111 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38111
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38111
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38111 None

CVE-2025-38112 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38112
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38112
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38112 None

CVE-2025-38115 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38115
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38115
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38115 None

CVE-2025-38122 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38122
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38122
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38122 None

CVE-2025-38126 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38126
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38126
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38126 None

CVE-2025-38138 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38138
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38138
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38138 None

CVE-2025-38155 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38155
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38155
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38155 None

CVE-2025-38157 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38157
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38157 None

CVE-2025-38158 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38158
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38158 None

CVE-2025-38163 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38163
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38163
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38163 None

CVE-2025-38165 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38165
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38165 None

CVE-2025-38166 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38166
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38166
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38166 None

CVE-2025-38174 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38174
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38174
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38174 None

CVE-2025-38181 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38181
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38181
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38181 None

CVE-2025-38182 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38182
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38182
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38182 None

CVE-2025-38200 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38200
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38200
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38200 None

CVE-2025-38202 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38202
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38202
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38202 None

CVE-2025-38208 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38208
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38208
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38208 None

CVE-2025-38214 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38214
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38214
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38214 None

CVE-2025-38217 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38217
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38217
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38217 None

CVE-2025-38225 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38225
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38225
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38225 None

CVE-2025-38219 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38219
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38219
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38219 None

CVE-2025-38230 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38230
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38230
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38230 None

CVE-2025-38236 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38236
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38236
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38236 None

CVE-2025-38239 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38239
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38239
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38239 None

CVE-2025-38265 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38265
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38265
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38265 None

CVE-2025-38274 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38274
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38274
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38274 None

CVE-2025-38278 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38278
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38278
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38278 None

CVE-2025-38285 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38285
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38285
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38285 None

CVE-2025-38286 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38286
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38286
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38286 None

CVE-2025-38307 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38307
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38307
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38307 None

CVE-2025-38313 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38313
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38313
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38313 None

CVE-2025-38323 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38323
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38323
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38323 None

CVE-2025-38328 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38328
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38328
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38328 None

CVE-2025-38332 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38332
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38332
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38332 None

CVE-2025-38334 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38334
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38334
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38334 None

CVE-2025-38338 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38338
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38338
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38338 None

CVE-2025-38342 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38342
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38342
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38342 None

CVE-2025-38343 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38343
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38343
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38343 None

CVE-2025-38344 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38344
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38344
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38344 None

CVE-2025-38347 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38347
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38347
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38347 None

CVE-2025-38348 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38348
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38348
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38348 None

CVE-2025-49177 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49177
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49177
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
24.1.6-2
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
24.1.6-2
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49177 None

CVE-2022-4743 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-4743
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-4743
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM SDL2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.30.9-1
Unknown None
Azure Linux 3.0 x64 SDL2 (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.30.9-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-4743 None

CVE-2022-4304 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-4304
MITRE
NVD

Issuing CNA: openssl-security@openssl.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-23    

Information published.


1.1    14-Feb-23    

Added openssl to CBL-Mariner 1.0


1.2    06-Apr-24    

Added hvloader to CBL-Mariner 2.0


1.3    30-Jun-24    

Information published.


1.4    15-Aug-24    

Information published.


2.0    06-Aug-25    

Added edk2 to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added rust to CBL-Mariner 2.0 Added cloud-hypervisor to CBL-Mariner 2.0 Added openssl to CBL-Mariner 2.0 Added hvloader to Azure Linux 3.0 Added edk2 to Azure Linux 3.0 Added openssl to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-4304
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
20240223gitedc6681206c1-1

1.0.1-4
None
Azure Linux 3.0 x64 edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
20240223gitedc6681206c1-1

1.0.1-4
None
CBL Mariner 1.0 ARM openssl (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1.1.1k-13
Unknown None
CBL Mariner 1.0 x64 openssl (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1.1.1k-13
Unknown None
CBL Mariner 2.0 ARM cloud-hypervisor (CBL-Mariner)
edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
openssl (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
30.0-2

20230301gitf80f052277c8-42
1.0.1-3
1.1.1k-21
None
CBL Mariner 2.0 x64 cloud-hypervisor (CBL-Mariner)
edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
openssl (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
30.0-2

20230301gitf80f052277c8-42
1.0.1-3
1.1.1k-21
None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-4304 None

CVE-2025-47268 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-47268
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-47268
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM iputils (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
20211215-3
Unknown None
CBL Mariner 2.0 x64 iputils (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
20211215-3
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-47268 None

CVE-2025-5791 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-5791
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-5791
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kata-containers (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.18.0.kata0-1
Unknown None
Azure Linux 3.0 x64 kata-containers (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.18.0.kata0-1
Unknown None
CBL Mariner 2.0 ARM kata-containers-cc (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.2.0.azl2-7
Unknown None
CBL Mariner 2.0 x64 kata-containers-cc (CBL-Mariner) Unknown Unknown Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
3.2.0.azl2-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-5791 None

CVE-2025-50076 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50076
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50076
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50076 None

CVE-2025-50079 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50079
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50079
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50079 None

CVE-2025-50081 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50081
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.1/TemporalScore:3.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50081
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 3.1
Temporal: 3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 3.1
Temporal: 3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50081 None

CVE-2025-50082 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50082
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50082
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50082 None

CVE-2025-50084 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50084
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50084
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50084 None

CVE-2025-50085 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50085
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50085
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50085 None

CVE-2025-50093 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50093
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50093
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50093 None

CVE-2025-50094 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50094
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50094
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50094 None

CVE-2025-50096 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50096
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:4.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50096
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50096 None

CVE-2025-50100 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50100
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:2.2/TemporalScore:2.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50100
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 2.2
Temporal: 2.2
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 2.2
Temporal: 2.2
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50100 None

CVE-2025-50101 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50101
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50101
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50101 None

CVE-2025-50102 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50102
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50102
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.43-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50102 None

CVE-2025-1220 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1220
MITRE
NVD

Issuing CNA: security@php.net

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1220
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM php (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
8.1.33-1
Unknown None
CBL Mariner 2.0 x64 php (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
8.1.33-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1220 None

CVE-2025-1735 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-1735
MITRE
NVD

Issuing CNA: security@php.net

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-1735
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM php (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.1.33-1
Unknown None
CBL Mariner 2.0 x64 php (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.1.33-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-1735 None

CVE-2025-6491 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-6491
MITRE
NVD

Issuing CNA: security@php.net

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-6491
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM php (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
8.1.33-1
Unknown None
CBL Mariner 2.0 x64 php (CBL-Mariner) Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
8.1.33-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-6491 None

CVE-2025-53905 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53905
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.1/TemporalScore:4.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53905
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
9.1.1552-1
Unknown None
Azure Linux 3.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
9.1.1552-1
Unknown None
CBL Mariner 2.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
9.1.1552-1
Unknown None
CBL Mariner 2.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
9.1.1552-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53905 None

CVE-2025-53906 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53906
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.1/TemporalScore:4.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53906
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
9.1.1552-1
Unknown None
Azure Linux 3.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
9.1.1552-1
Unknown None
CBL Mariner 2.0 ARM vim (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
9.1.1552-1
Unknown None
CBL Mariner 2.0 x64 vim (CBL-Mariner) Unknown Unknown Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
9.1.1552-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53906 None

CVE-2025-49175 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49175
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49175
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
24.1.6-2
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
24.1.6-2
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1.20.10-16
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1.20.10-16
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49175 None

CVE-2025-49180 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49180
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-2
Unknown None
Azure Linux 3.0 x64 xorg-x11-server-Xwayland (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
24.1.6-2
Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-16
Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-16
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49180 None

CVE-2024-22653 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-22653
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-22653
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM yasm (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1.3.0-17
Unknown None
Azure Linux 3.0 x64 yasm (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1.3.0-17
Unknown None
CBL Mariner 2.0 ARM yasm (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1.3.0-17
Unknown None
CBL Mariner 2.0 x64 yasm (CBL-Mariner) Unknown Unknown Base: 4.8
Temporal: 4.8
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1.3.0-17
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-22653 None

CVE-2025-7546 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-7546
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-7546
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM binutils (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2.41-7
Unknown None
Azure Linux 3.0 x64 binutils (CBL-Mariner) Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2.41-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-7546 None

CVE-2025-48938 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-48938
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-48938
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM gh (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.62.0-9
Unknown None
Azure Linux 3.0 x64 gh (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.62.0-9
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-48938 None

CVE-2024-45310 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45310
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.6/TemporalScore:3.6
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Jan-25    

Information published.


2.0    11-Feb-25    

Information published.


3.0    05-Apr-25    

Information published.


4.0    06-Aug-25    

Added kata-containers to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added runc to Azure Linux 3.0 Added moby-runc to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45310
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cri-tools (CBL-Mariner)
kata-containers (CBL-Mariner)
runc (CBL-Mariner)
Unknown Unknown Base: 3.6
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1.32.0-1

3.18.0.kata0-1
1.2.2-1
None
Azure Linux 3.0 x64 cri-tools (CBL-Mariner)
kata-containers (CBL-Mariner)
runc (CBL-Mariner)
Unknown Unknown Base: 3.6
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1.32.0-1

3.18.0.kata0-1
1.2.2-1
None
CBL Mariner 2.0 ARM moby-runc (CBL-Mariner) Unknown Unknown Base: 3.6
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1.1.9-8
Unknown None
CBL Mariner 2.0 x64 moby-runc (CBL-Mariner) Unknown Unknown Base: 3.6
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1.1.9-8
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45310 None

CVE-2025-4432 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-4432
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-4432
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kata-containers (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.18.0.kata0-1
Unknown None
Azure Linux 3.0 x64 kata-containers (CBL-Mariner) Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
3.18.0.kata0-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-4432 None

CVE-2025-37987 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-37987
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-37987
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-37987 None

CVE-2025-38003 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38003
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38003
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38003 None

CVE-2025-38037 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38037
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38037
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38037 None

CVE-2025-38040 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38040
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38040
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38040 None

CVE-2025-38043 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38043
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38043
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38043 None

CVE-2025-38052 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38052
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38052
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38052 None

CVE-2025-38062 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38062
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38062
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38062 None

CVE-2025-38066 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38066
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38066
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38066 None

CVE-2025-38077 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38077
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38077
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38077 None

CVE-2025-38080 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38080
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38080
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38080 None

CVE-2025-38084 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38084
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38084
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38084 None

CVE-2025-38087 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38087
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38087
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38087 None

CVE-2025-38092 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38092
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38092
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38092 None

CVE-2025-38107 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38107
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38107
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38107 None

CVE-2025-38123 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38123
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38123
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38123 None

CVE-2025-38131 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38131
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38131
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38131 None

CVE-2025-38142 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38142
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38142
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38142 None

CVE-2025-38145 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38145
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38145
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38145 None

CVE-2025-38147 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38147
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38147
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38147 None

CVE-2025-38149 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38149
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38149
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38149 None

CVE-2025-38170 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38170
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38170
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38170 None

CVE-2025-38180 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38180
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38180 None

CVE-2025-38184 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38184
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38184
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38184 None

CVE-2025-38192 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38192
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38192
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38192 None

CVE-2025-38193 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38193
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38193
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38193 None

CVE-2025-38215 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38215
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38215
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38215 None

CVE-2025-38231 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38231
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38231
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38231 None

CVE-2025-38244 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38244
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38244
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38244 None

CVE-2025-38245 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38245
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38245
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38245 None

CVE-2025-38260 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38260
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38260
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38260 None

CVE-2025-38275 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38275
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38275
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38275 None

CVE-2025-38263 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38263
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38263
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38263 None

CVE-2025-38310 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38310
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38310
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38310 None

CVE-2025-38320 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38320
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38320
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38320 None

CVE-2025-38312 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38312
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38312
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38312 None

CVE-2025-38319 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38319
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38319
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38319 None

CVE-2023-37464 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-37464
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-37464
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cjose (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.6.2.2-7
Unknown None
Azure Linux 3.0 x64 cjose (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.6.2.2-7
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-37464 None

CVE-2022-4603 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-4603
MITRE
NVD

Issuing CNA: cna@vuldb.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-4603
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM ppp (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2.5.0-1
Unknown None
Azure Linux 3.0 x64 ppp (CBL-Mariner) Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2.5.0-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-4603 None

CVE-2015-3310 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2015-3310
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2015-3310
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM ppp (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.5.0-1
Unknown None
Azure Linux 3.0 x64 ppp (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.5.0-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2015-3310 None

CVE-2025-38352 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38352
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38352
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38352 None

CVE-2025-38368 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38368
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38368
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38368 None

CVE-2025-38369 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38369
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38369
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38369 None

CVE-2025-38418 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38418
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38418
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38418 None

CVE-2025-38420 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38420
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38420
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38420 None

CVE-2025-38422 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38422
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38422
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38422 None

CVE-2025-38425 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38425
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38425
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38425 None

CVE-2025-38436 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38436
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38436
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38436 None

CVE-2025-38498 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38498
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38498
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38498 None

CVE-2025-4565 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-4565
MITRE
NVD

Issuing CNA: cve-coordination@google.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-25    

Information published.


2.0    29-Jul-25    

Added protobuf to CBL-Mariner 2.0 Added protobuf to Azure Linux 3.0


2.1    07-Aug-25    

Added protobuf to CBL-Mariner 2.0 Added protobuf to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-4565
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM protobuf (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
25.3-5
Unknown None
Azure Linux 3.0 x64 protobuf (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
25.3-5
Unknown None
CBL Mariner 2.0 ARM protobuf (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.17.3-4
Unknown None
CBL Mariner 2.0 x64 protobuf (CBL-Mariner) Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.17.3-4
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-4565 None

CVE-2025-38354 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38354
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38354
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38354 None

CVE-2025-38362 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38362
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38362
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38362 None

CVE-2025-38365 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38365
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38365
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38365 None

CVE-2025-38415 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38415
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38415
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38415 None

CVE-2025-38419 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38419
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38419
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38419 None

CVE-2025-38428 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38428
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38428
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38428 None

CVE-2025-38429 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38429
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38429
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38429 None

CVE-2025-38430 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-38430
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-38430
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
6.6.96.1-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-38430 None

CVE-2024-4855 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4855
MITRE
NVD

Issuing CNA: cve@gitlab.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Jul-25    

Information published.


1.1    07-Aug-25    

Added wireshark to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4855
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM wireshark (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.4.7-1
Unknown None
Azure Linux 3.0 x64 wireshark (CBL-Mariner) Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.4.7-1
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4855 None

CVE-2022-1292 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-1292
MITRE
NVD

Issuing CNA: openssl-security@openssl.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-May-22    

Information published.


1.1    30-Jun-24    

Information published.


1.2    29-Aug-24    

Information published.


1.3    30-Aug-24    

Information published.


1.4    31-Aug-24    

Information published.


1.5    01-Sep-24    

Information published.


1.6    02-Sep-24    

Information published.


1.7    03-Sep-24    

Information published.


1.8    05-Sep-24    

Information published.


1.9    06-Sep-24    

Information published.


2.0    07-Sep-24    

Information published.


2.1    08-Sep-24    

Information published.


2.2    11-Sep-24    

Information published.


2.3    11-Aug-25    

Added openssl to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0 Added hvloader to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-1292
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
20240223gitedc6681206c1-2

1.0.1-2
None
Azure Linux 3.0 x64 edk2 (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
20240223gitedc6681206c1-2

1.0.1-2
None
CBL Mariner 1.0 ARM openssl (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.1.1k-10
Unknown None
CBL Mariner 1.0 x64 openssl (CBL-Mariner) Unknown Unknown Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.1.1k-10
Unknown None
CBL Mariner 2.0 ARM openssl (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1.1.1k-15
Unknown None
CBL Mariner 2.0 x64 openssl (CBL-Mariner) Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1.1.1k-15
Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-1292 None