This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | Azure File Sync | CVE-2025-53729 | Microsoft Azure File Sync Elevation of Privilege Vulnerability |
Microsoft | Azure OpenAI | CVE-2025-53767 | Azure OpenAI Elevation of Privilege Vulnerability |
Microsoft | Azure Portal | CVE-2025-53792 | Azure Portal Elevation of Privilege Vulnerability |
Microsoft | Azure Stack | CVE-2025-53793 | Azure Stack Hub Information Disclosure Vulnerability |
Microsoft | Azure Stack | CVE-2025-53765 | Azure Stack Hub Information Disclosure Vulnerability |
Microsoft | Azure Virtual Machines | CVE-2025-49707 | Azure Virtual Machines Spoofing Vulnerability |
Microsoft | Azure Virtual Machines | CVE-2025-53781 | Azure Virtual Machines Information Disclosure Vulnerability |
Microsoft | Desktop Windows Manager | CVE-2025-53152 | Desktop Windows Manager Remote Code Execution Vulnerability |
Microsoft | Desktop Windows Manager | CVE-2025-50153 | Desktop Windows Manager Elevation of Privilege Vulnerability |
Microsoft | GitHub Copilot and Visual Studio | CVE-2025-53773 | GitHub Copilot and Visual Studio Remote Code Execution Vulnerability |
Microsoft | Graphics Kernel | CVE-2025-50176 | DirectX Graphics Kernel Remote Code Execution Vulnerability |
Microsoft | Kernel Streaming WOW Thunk Service Driver | CVE-2025-53149 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability |
Microsoft | Kernel Transaction Manager | CVE-2025-53140 | Windows Kernel Transaction Manager Elevation of Privilege Vulnerability |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38163 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38126 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38165 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38158 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38157 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38155 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38138 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38122 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38085 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38089 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38083 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38072 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38079 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38112 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38115 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38111 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38097 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38100 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38166 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38274 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38278 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38265 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38236 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38239 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38285 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38323 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38328 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38313 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38286 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38307 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38200 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38202 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38182 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38174 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38181 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38208 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38219 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38230 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38225 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38214 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38217 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38185 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38194 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38197 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38146 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38161 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38183 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38251 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38257 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38258 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38218 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38220 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38222 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38088 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38090 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38102 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38065 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38078 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38081 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38135 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38136 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38143 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38103 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38113 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38127 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38277 | Unknown |
2499f714-1537-4658-8207-48ae4bb9eae9 | Mariner | CVE-2025-4947 | Unknown |
6b3ad84c-e1a6-4bf7-a703-f496b71e49db | Mariner | CVE-2025-4748 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50091 | Unknown |
cve-coordination@google.com | Mariner | CVE-2025-1550 | Unknown |
cve@gitlab.com | Mariner | CVE-2024-4853 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-43806 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38044 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38068 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38071 | Unknown |
cna@vuldb.com | Mariner | CVE-2025-7545 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38004 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38039 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38321 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38331 | Unknown |
cve@gitlab.com | Mariner | CVE-2024-2955 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38300 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38305 | Unknown |
cve@mitre.org | Mariner | CVE-2023-26819 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38424 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-48916 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-4948 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-53023 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38363 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38416 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38332 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38231 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38244 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38215 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38192 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38193 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38245 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38310 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38320 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38263 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38260 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38275 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38184 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38123 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38131 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38107 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38087 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38092 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38142 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38170 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38180 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38149 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38145 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38147 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38312 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38362 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38365 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38354 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38498 | Unknown |
cve-coordination@google.com | Mariner | CVE-2025-4565 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38415 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38430 | Unknown |
cve@gitlab.com | Mariner | CVE-2024-4855 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38429 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38419 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38428 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38436 | Unknown |
cve@mitre.org | Mariner | CVE-2015-3310 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38352 | Unknown |
cna@vuldb.com | Mariner | CVE-2022-4603 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38319 | Unknown |
security-advisories@github.com | Mariner | CVE-2023-37464 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38368 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38422 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38425 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38420 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38369 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38418 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50082 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50084 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50081 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50076 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50079 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50085 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50100 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50101 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50096 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50093 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50094 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-5791 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38343 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38344 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38342 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38334 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38338 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38347 | Unknown |
openssl-security@openssl.org | Mariner | CVE-2022-4304 | Unknown |
cve@mitre.org | Mariner | CVE-2025-47268 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-4743 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38348 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-49177 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50102 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38040 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38043 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38037 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-37987 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38003 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38052 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38080 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38084 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38077 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38062 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38066 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-4432 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-53905 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-53906 | Unknown |
security@php.net | Mariner | CVE-2025-6491 | Unknown |
security@php.net | Mariner | CVE-2025-1220 | Unknown |
security@php.net | Mariner | CVE-2025-1735 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-49175 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-48938 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-45310 | Unknown |
cna@vuldb.com | Mariner | CVE-2025-7546 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-49180 | Unknown |
cve@mitre.org | Mariner | CVE-2024-22653 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38063 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38191 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38190 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38198 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38212 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38211 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38160 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38153 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38159 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38173 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38167 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38262 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38259 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38280 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38283 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38282 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38227 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38213 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38226 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38249 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38229 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38000 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50087 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38001 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38061 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38045 | Unknown |
36c7be3b-2937-45df-85ea-ca7133ea542c | Mariner | CVE-2024-6484 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38034 | Unknown |
patrick@puiterwijk.org | Mariner | CVE-2024-7730 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50080 | Unknown |
infosec@edk2.groups.io | Mariner | CVE-2023-45231 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38117 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38110 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38118 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38148 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38119 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38075 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38074 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38086 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38109 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38108 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-49176 | Unknown |
a59d8014-47c4-4630-ab43-e1b13cbe58e3 | Mariner | CVE-2025-5455 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-49178 | Unknown |
cna@vuldb.com | Mariner | CVE-2025-6140 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-49179 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50098 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50099 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50104 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-7519 | Unknown |
2499f714-1537-4658-8207-48ae4bb9eae9 | Mariner | CVE-2025-5025 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38048 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38035 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38051 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38059 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38058 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-27308 | Unknown |
security@apache.org | Mariner | CVE-2025-54090 | Unknown |
secalert@redhat.com | Mariner | CVE-2025-4574 | Unknown |
openssl-security@openssl.org | Mariner | CVE-2022-1292 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-37958 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38337 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38336 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38345 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-49133 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38346 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38293 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38290 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38304 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38326 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2025-38324 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50083 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50078 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50086 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50097 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50092 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-50181 | Unknown |
cna@python.org | Mariner | CVE-2025-6069 | Unknown |
infosec@edk2.groups.io | Mariner | CVE-2023-45229 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-50077 | Unknown |
infosec@edk2.groups.io | Mariner | CVE-2024-38796 | Unknown |
Microsoft | Microsoft 365 Copilot's Business Chat | CVE-2025-53787 | Microsoft 365 Copilot BizChat Information Disclosure Vulnerability |
Microsoft | Microsoft 365 Copilot's Business Chat | CVE-2025-53774 | Microsoft 365 Copilot BizChat Information Disclosure Vulnerability |
Microsoft | Microsoft Brokering File System | CVE-2025-53142 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
Microsoft | Microsoft Dynamics 365 (on-premises) | CVE-2025-49745 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Microsoft | Microsoft Dynamics 365 (on-premises) | CVE-2025-53728 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-8582 | Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-8580 | Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-8581 | Chromium: CVE-2025-8581 Inappropriate implementation in Extensions |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-8578 | Chromium: CVE-2025-8578 Use after free in Cast |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-8576 | Chromium: CVE-2025-8576 Use after free in Extensions |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-8577 | Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-8583 | Chromium: CVE-2025-8583 Inappropriate implementation in Permissions |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-8579 | Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome |
Microsoft | Microsoft Edge for Android | CVE-2025-49755 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability |
Microsoft | Microsoft Edge for Android | CVE-2025-49736 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2025-25005 | Microsoft Exchange Server Tampering Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2025-25006 | Microsoft Exchange Server Spoofing Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2025-25007 | Microsoft Exchange Server Spoofing Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2025-53786 | Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2025-33051 | Microsoft Exchange Server Information Disclosure Vulnerability |
Microsoft | Microsoft Graphics Component | CVE-2025-49743 | Windows Graphics Component Elevation of Privilege Vulnerability |
Microsoft | Microsoft Graphics Component | CVE-2025-50165 | Windows Graphics Component Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-53732 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-53740 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-53731 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-53759 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-53737 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-53739 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-53735 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-53741 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office PowerPoint | CVE-2025-53761 | Microsoft PowerPoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2025-53760 | Microsoft SharePoint Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2025-49712 | Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Visio | CVE-2025-53730 | Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Visio | CVE-2025-53734 | Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-53738 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-53736 | Microsoft Word Information Disclosure Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-53784 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-53733 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Teams | CVE-2025-53783 | Microsoft Teams Remote Code Execution Vulnerability |
Microsoft | Remote Access Point-to-Point Protocol (PPP) EAP-TLS | CVE-2025-50159 | Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability |
Microsoft | Remote Desktop Server | CVE-2025-50171 | Remote Desktop Spoofing Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-50167 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-53155 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-49751 | Windows Hyper-V Denial of Service Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-53723 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-48807 | Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2025-49758 | Microsoft SQL Server Elevation of Privilege Vulnerability |
Microsoft | SQL Server | CVE-2025-24999 | Microsoft SQL Server Elevation of Privilege Vulnerability |
Microsoft | SQL Server | CVE-2025-53727 | Microsoft SQL Server Elevation of Privilege Vulnerability |
Microsoft | SQL Server | CVE-2025-49759 | Microsoft SQL Server Elevation of Privilege Vulnerability |
Microsoft | SQL Server | CVE-2025-47954 | Microsoft SQL Server Elevation of Privilege Vulnerability |
Microsoft | Storage Port Driver | CVE-2025-53156 | Windows Storage Port Driver Information Disclosure Vulnerability |
Microsoft | Web Deploy | CVE-2025-53772 | Web Deploy Remote Code Execution Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-53718 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-53134 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-49762 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-53147 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-53154 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-53137 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-53141 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Cloud Files Mini Filter Driver | CVE-2025-50170 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Connected Devices Platform Service | CVE-2025-53721 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability |
Microsoft | Windows DirectX | CVE-2025-53135 | DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows DirectX | CVE-2025-50172 | DirectX Graphics Kernel Denial of Service Vulnerability |
Microsoft | Windows Distributed Transaction Coordinator | CVE-2025-50166 | Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability |
Microsoft | Windows File Explorer | CVE-2025-50154 | Microsoft Windows File Explorer Spoofing Vulnerability |
Microsoft | Windows GDI+ | CVE-2025-53766 | GDI+ Remote Code Execution Vulnerability |
Microsoft | Windows Installer | CVE-2025-50173 | Windows Installer Elevation of Privilege Vulnerability |
Microsoft | Windows Kerberos | CVE-2025-53779 | Windows Kerberos Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-49761 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-53151 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Local Security Authority Subsystem Service (LSASS) | CVE-2025-53716 | Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability |
Microsoft | Windows Media | CVE-2025-53131 | Windows Media Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2025-53145 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2025-53143 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2025-50177 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2025-53144 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
Microsoft | Windows NT OS Kernel | CVE-2025-53136 | NT OS Kernel Information Disclosure Vulnerability |
Microsoft | Windows NTFS | CVE-2025-50158 | Windows NTFS Information Disclosure Vulnerability |
Microsoft | Windows NTLM | CVE-2025-53778 | Windows NTLM Elevation of Privilege Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-53133 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows Push Notifications | CVE-2025-53725 | Windows Push Notifications Apps Elevation of Privilege Vulnerability |
Microsoft | Windows Push Notifications | CVE-2025-53724 | Windows Push Notifications Apps Elevation of Privilege Vulnerability |
Microsoft | Windows Push Notifications | CVE-2025-50155 | Windows Push Notifications Apps Elevation of Privilege Vulnerability |
Microsoft | Windows Push Notifications | CVE-2025-53726 | Windows Push Notifications Apps Elevation of Privilege Vulnerability |
Microsoft | Windows Remote Desktop Services | CVE-2025-53722 | Windows Remote Desktop Services Denial of Service Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-50157 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53153 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-50163 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-50162 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-50164 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53148 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53138 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-50156 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-49757 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53719 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53720 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-50160 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Security App | CVE-2025-53769 | Windows Security App Spoofing Vulnerability |
Microsoft | Windows SMB | CVE-2025-50169 | Windows SMB Remote Code Execution Vulnerability |
Microsoft | Windows StateRepository API | CVE-2025-53789 | Windows StateRepository API Server file Elevation of Privilege Vulnerability |
Microsoft | Windows Subsystem for Linux | CVE-2025-53788 | Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Win32K - GRFX | CVE-2025-50161 | Win32k Elevation of Privilege Vulnerability |
Microsoft | Windows Win32K - GRFX | CVE-2025-53132 | Win32k Elevation of Privilege Vulnerability |
Microsoft | Windows Win32K - ICOMP | CVE-2025-50168 | Win32k Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49751
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to cause denial of service on the Hyper-V host environment. According to the CVSS metric, the Hyper-V attack vector is adjacent (AV:A). What does that mean for this vulnerability? Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines within the virtual network can only communicate with each other. In this attack vector, the vulnerable component is bound to the network stack, but the attack is limited to systems configured to use the HNV network. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49751 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Denial of Service | 5062560 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Denial of Service | 5062560 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Denial of Service | 5062560 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062572 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062572 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Denial of Service | 5062570 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-49751 | HongZhenhao with TianGong Team of Legendsec at Qi'anxin Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49745
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Executive Summary: Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:L), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability). According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49745 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 (on-premises) version 9.1 | 5059086 (Security Update) | Important | Spoofing | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
9.1.38.10 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-49745 | batram batram |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-49758
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network. FAQ: How could an attacker exploit this vulnerability? An authenticated attacker with explicit permissions could exploit the vulnerability by logging in to the SQL server and could then elevate their privileges to sysadmin. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49758 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | 5063762 (Security Update) | Important | Elevation of Privilege | 5058718 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.6465.1 |
Maybe | None |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | 5063761 (Security Update) | Important | Elevation of Privilege | 5058717 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.7060.1 |
Maybe | None |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | 5063759 (Security Update) | Important | Elevation of Privilege | 5058714 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.3500.1 |
Maybe | None |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | 5063760 (Security Update) | Important | Elevation of Privilege | 5058716 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.2080.1 |
Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 32) | 5063757 (Security Update) | Important | Elevation of Privilege | 5058714 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4440.1 |
Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5063758 (Security Update) | Important | Elevation of Privilege | 5058713 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2140.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 20) | 5063814 (Security Update) | Important | Elevation of Privilege | 5059390 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4210.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5063756 (Security Update) | Important | Elevation of Privilege | 5058712 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1145.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-49758 | Chris Thompson with SpecterOps |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-53727
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network. FAQ: How could an attacker exploit the vulnerability? An attacker could inject arbitrary T-SQL commands by crafting a malicious database name. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain sysadmin privileges. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53727 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | 5063762 (Security Update) | Important | Elevation of Privilege | 5058718 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.6465.1 |
Maybe | None |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | 5063761 (Security Update) | Important | Elevation of Privilege | 5058717 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.7060.1 |
Maybe | None |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | 5063759 (Security Update) | Important | Elevation of Privilege | 5058714 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.3500.1 |
Maybe | None |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | 5063760 (Security Update) | Important | Elevation of Privilege | 5058716 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.2080.1 |
Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 32) | 5063757 (Security Update) | Important | Elevation of Privilege | 5058714 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4440.1 |
Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5063758 (Security Update) | Important | Elevation of Privilege | 5058713 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2140.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 20) | 5063814 (Security Update) | Important | Elevation of Privilege | 5059390 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4210.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5063756 (Security Update) | Important | Elevation of Privilege | 5058712 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1145.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53727 | Fabiano Amorim with Pythian |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53729
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53729 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure File Sync v18.0 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.0.0.0 |
No | None | |
Azure File Sync v19.0 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.1.0.0 |
No | None | |
Azure File Sync v20.0 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
20.0.0.0 |
No | None | |
Azure File Sync v21.0 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
21.2.0.0 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-53729 | Michal Kamensky with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-33051
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Exposure of sensitive information to an unauthorized actor in Microsoft Exchange Server allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is whether an email address exists on the server or not. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-33051 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5063223 (Security Update) | Important | Information Disclosure | 5049233 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.01.2507.058 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 14 | 5063222 (Security Update) | Important | Information Disclosure | 5049233 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.1544.033 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 15 | 5063221 (Security Update) | Important | Information Disclosure | 5049233 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.1748.036 |
Yes | None |
Microsoft Exchange Server Subscription Edition RTM | 5063224 (Security Update) | Important | Information Disclosure | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.2562.020 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-33051 | Ben Sparks |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53730
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to be tricked into opening a malicious file in Visio. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53730 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-53730 | c0d3nh4ck with Zscaler's ThreatLabz |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53741
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53741 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002758 (Security Update) | Important | Remote Code Execution | 5002749 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002758 (Security Update) | Important | Remote Code Execution | 5002749 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Office Online Server | 5002752 (Security Update) | Important | Remote Code Execution | 5002740 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20034 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53741 | boolgombear & Jmini |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53759
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53759 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Office Online Server | 5002752 (Security Update) | Important | Remote Code Execution | 5002740 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20034 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53759 | Jmini with boolgombear Jmini with boolgombear |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53760
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: Server-side request forgery (ssrf) in Microsoft Office SharePoint allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H), and some loss of integrity (I:L) and no loss of availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could view sensitive information, a token in this scenario (Confidentiality), and make some changes to disclosed information (Integrity), but they would not be able to affect Availability. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user. I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running? Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53760 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002771 (Security Update) | Important | Elevation of Privilege | 5002760 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
16.0.5513.1002 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002769 (Security Update) | Important | Elevation of Privilege | 5002754 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
16.0.10417.20041 |
Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002773 (Security Update) | Important | Elevation of Privilege | 5002768 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
16.0.18526.20518 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53760 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53761
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft PowerPoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53761 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft PowerPoint 2016 (32-bit edition) | 5002765 (Security Update) | Important | Remote Code Execution | 5002746 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft PowerPoint 2016 (64-bit edition) | 5002765 (Security Update) | Important | Remote Code Execution | 5002746 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53761 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-24999
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network. FAQ: How could an attacker exploit this vulnerability? An authenticated attacker with explicit permissions could exploit the vulnerability by logging in to the SQL server and could then elevate their privileges to sysadmin. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain sysadmin privileges. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24999 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | 5063762 (Security Update) | Important | Elevation of Privilege | 5058718 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.6465.1 |
Maybe | None |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | 5063761 (Security Update) | Important | Elevation of Privilege | 5058717 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.7060.1 |
Maybe | None |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | 5063759 (Security Update) | Important | Elevation of Privilege | 5058714 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.3500.1 |
Maybe | None |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | 5063760 (Security Update) | Important | Elevation of Privilege | 5058716 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.2080.1 |
Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 32) | 5063757 (Security Update) | Important | Elevation of Privilege | 5058714 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4440.1 |
Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5063758 (Security Update) | Important | Elevation of Privilege | 5058713 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2140.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 20) | 5063814 (Security Update) | Important | Elevation of Privilege | 5059390 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4210.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5063756 (Security Update) | Important | Elevation of Privilege | 5058712 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1145.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-24999 | Emad Al-Mousa |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53772
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Web Deploy Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit the vulnerability? An authenticated attacker could exploit the vulnerability by sending a malicious http request to the web server. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53772 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Web Deploy 4.0 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.2001 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53772 | Batuhan Er with HawkTrace |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53773
MITRE NVD Issuing CNA: Microsoft |
CVE Title: GitHub Copilot and Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that a user trigger the payload in the application. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53773 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2022 version 17.14 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.14.12 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53773 | Johann Rehberger with https://embracethered.com/ Markus Vervier with Persistent Security Industries GmbH |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53781
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Virtual Machines Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Executive Summary: Exposure of sensitive information to an unauthorized actor in Azure Virtual Machines allows an authorized attacker to disclose information over a network. FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53781 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
DCadsv5-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
DCasv5-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
DCedsv5-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
DCesv5-series - Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
DCesv6-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
ECadsv5-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
ECasv5-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
ECedsv5-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
ECesv5-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Ecesv6-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
NCCadsH100v5-series Azure VM | Critical | Information Disclosure | None | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-53781 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53786
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability within the organization’s cloud environment? In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable trace. This risk arises because Exchange Server and Exchange Online share the same service principal in hybrid configurations. According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this scenario, successfully exploiting the vulnerability could enable an attacker to escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable traces. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to first gain or possess administrator access on an Exchange Server. Microsoft Exchange Server Subscription Edition RTM didn't exist in April when the hot fix was released. Why is it listed in the Security Updates Table? Support for the dedicated Exchange hybrid app feature is already part of the initial release of the Exchange Server SE version. If you have already migrated to the newest version you already have this level of protection from the vulnerability. All you need to do is to follow the steps as outlined in the documentation to enable the feature and clear the certificates from the shared service principals keyCredentials. What steps do I need to take to better protect my hybrid environment?
Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53786 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5050674 (Security Update) | Important | Elevation of Privilege | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.055 |
Maybe | None | |
Microsoft Exchange Server 2019 Cumulative Update 14 | 5050673 (Security Update) | Important | Elevation of Privilege | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1544.025 |
Maybe | None | |
Microsoft Exchange Server 2019 Cumulative Update 15 | 5050672 (Security Update) | Important | Elevation of Privilege | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1748.024 |
Maybe | None | |
Microsoft Exchange Server Subscription Edition RTM | 5047155 (Security Update) | Important | Elevation of Privilege | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.2562.017 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53786 | Dirk-jan Mollema with Outsider Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-8582
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM
CVSS: None Executive Summary: Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-8582 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-8582 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-8581
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-8581 Inappropriate implementation in Extensions
CVSS: None Executive Summary: Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-8581 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-8581 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-8580
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems
CVSS: None Executive Summary: Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-8580 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-8580 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-8578
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-8578 Use after free in Cast
CVSS: None Executive Summary: Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-8578 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-8578 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-8576
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-8576 Use after free in Extensions
CVSS: None Executive Summary: Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-8576 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-8576 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-25005
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Tampering Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Improper input validation in Microsoft Exchange Server allows an authorized attacker to perform tampering over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Tampering |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25005 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5063223 (Security Update) | Important | Tampering | 5049233 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.01.2507.058 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 14 | 5063222 (Security Update) | Important | Tampering | 5049233 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.1544.033 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 15 | 5063221 (Security Update) | Important | Tampering | 5049233 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.1748.036 |
Yes | None |
Microsoft Exchange Server Subscription Edition RTM | 5063224 (Security Update) | Important | Tampering | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.2562.020 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-25005 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-25006
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Executive Summary: Improper handling of additional special element in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability? An attacker could spoof incorrect 5322.From email address that is displayed to a user. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25006 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5063223 (Security Update) | Important | Spoofing | 5049233 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
15.01.2507.058 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 14 | 5063222 (Security Update) | Important | Spoofing | 5049233 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
15.02.1544.033 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 15 | 5063221 (Security Update) | Important | Spoofing | 5049233 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
15.02.1748.036 |
Yes | None |
Microsoft Exchange Server Subscription Edition RTM | 5063224 (Security Update) | Important | Spoofing | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
15.02.2562.020 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-25006 | Anna Breeva |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-25007
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Executive Summary: Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability? An attacker could spoof incorrect 5322.From email address that is displayed to a user. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25007 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5063223 (Security Update) | Important | Spoofing | 5049233 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
15.01.2507.058 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 14 | 5063222 (Security Update) | Important | Spoofing | 5049233 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
15.02.1544.033 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 15 | 5063221 (Security Update) | Important | Spoofing | 5049233 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
15.02.1748.036 |
Yes | None |
Microsoft Exchange Server Subscription Edition RTM | 5063224 (Security Update) | Important | Spoofing | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
15.02.2562.020 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-25007 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49743
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with privileges could send controlled inputs to exploit this vulnerability. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49743 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-49743 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49757
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49757 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5062624 (Monthly Rollup) 5062618 (Security Only) |
Important | Remote Code Execution | 5061026 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23418 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5062624 (Monthly Rollup) 5062618 (Security Only) |
Important | Remote Code Execution | 5061026 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23418 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5062624 (Monthly Rollup) 5062618 (Security Only) |
Important | Remote Code Execution | 5061026 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23418 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5062624 (Monthly Rollup) 5062618 (Security Only) |
Important | Remote Code Execution | 5061026 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23418 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5062632 (Monthly Rollup) 5062619 (Security Only) |
Important | Remote Code Execution | 5061078 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27820 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5062632 (Monthly Rollup) 5062619 (Security Only) |
Important | Remote Code Execution | 5061078 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27820 |
Yes | None |
Windows Server 2012 | 5062592 (Monthly Rollup) | Important | Remote Code Execution | 5061059 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25573 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5062592 (Monthly Rollup) | Important | Remote Code Execution | 5061059 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25573 |
Yes | None |
Windows Server 2012 R2 | 5062597 (Monthly Rollup) | Important | Remote Code Execution | 5061018 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22676 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5062597 (Monthly Rollup) | Important | Remote Code Execution | 5061018 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22676 |
Yes | None |
Windows Server 2016 | 5062560 (Security Update) | Important | Remote Code Execution | 5061010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5062560 (Security Update) | Important | Remote Code Execution | 5061010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows Server 2019 | 5062557 (Security Update) | Important | Remote Code Execution | 5060531 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5062557 (Security Update) | Important | Remote Code Execution | 5060531 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows Server 2022 | 5062572 (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3932 |
Yes | None | |
Windows Server 2022 (Server Core installation) | 5062572 (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3932 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5062570 (Security Update) | Important | Remote Code Execution | 5060118 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1732 |
Yes | None |
Windows Server 2025 | 5062553 (Security Update) | Important | Remote Code Execution | 5060842 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5062553 (Security Update) | Important | Remote Code Execution | 5060842 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-49757 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-49759
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. How could an attacker exploit the vulnerability? An attacker could inject arbitrary T-SQL commands by crafting a malicious database name. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49759 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | 5063762 (Security Update) | Important | Elevation of Privilege | 5058718 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.6465.1 |
Maybe | None |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | 5063761 (Security Update) | Important | Elevation of Privilege | 5058717 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.7060.1 |
Maybe | None |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | 5063759 (Security Update) | Important | Elevation of Privilege | 5058714 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.3500.1 |
Maybe | None |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | 5063760 (Security Update) | Important | Elevation of Privilege | 5058716 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.2080.1 |
Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 32) | 5063757 (Security Update) | Important | Elevation of Privilege | 5058714 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4440.1 |
Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5063758 (Security Update) | Important | Elevation of Privilege | 5058713 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2140.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 20) | 5063814 (Security Update) | Important | Elevation of Privilege | 5059390 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4210.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5063756 (Security Update) | Important | Elevation of Privilege | 5058712 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1145.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-49759 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49761
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49761 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-49761 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49762
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49762 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-49762 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50153
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Desktop Windows Manager Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally. FAQ: What privileges could an attacker gain with successful exploitation? An attacker who successfully exploited this vulnerability could gain unauthorized access to system resources, potentially allowing them to perform actions with the same privileges as the compromised process. This could lead to further system compromise and unauthorized actions within the network. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50153 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50153 | Varun Goel |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50154
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to be tricked into opening a folder that contains a specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50154 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Spoofing | 5062561 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Spoofing | 5062561 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Spoofing | 5062560 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Spoofing | 5062560 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Spoofing | 5062557 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Spoofing | 5062557 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Spoofing | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Spoofing | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Spoofing | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Spoofing | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Spoofing | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Spoofing | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Spoofing | 5062552 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Spoofing | 5062552 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Spoofing | 5062552 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Spoofing | 5062552 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Spoofing | 5062624 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Spoofing | 5062624 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Spoofing | 5062624 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Spoofing | 5062624 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Spoofing | 5062632 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Spoofing | 5062632 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Spoofing | 5062592 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Spoofing | 5062592 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Spoofing | 5062597 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Spoofing | 5062597 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Spoofing | 5062560 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Spoofing | 5062560 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Spoofing | 5062557 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Spoofing | 5062557 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062572 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062572 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Spoofing | 5062570 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50154 | Ruben Enkaoua with Cymulate |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50156
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Executive Summary: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50156 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50156 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50158
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.3
Executive Summary: Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50158 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Information Disclosure | 5062561 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Information Disclosure | 5062561 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 7.0 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50158 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50159
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Use after free in Remote Access Point-to-Point Protocol (PPP) EAP-TLS allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability? An administrative user must be convinced to open a malicious COM object like an .rtf file. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50159 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50159 | Hussein Aurbyae with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50160
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50160 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50160 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50161
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with privileges could send controlled inputs to exploit this vulnerability. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50161 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50161 | Arnaud Lubin |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50162
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50162 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50162 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50163
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50163 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50163 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50164
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50164 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50164 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50165
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, attack vector is (AV:N) and user interaction is none (UI:N). What does that mean for this vulnerability? This can happen without user intervention. An attacker can use an uninitialized function pointer being called when decoding a JPEG image. This can be embedded in Office and 3rd party documents/files How could an attacker exploit the vulnerability? An attacker who successfully exploits this vulnerability could achieve remote code execution without user interaction. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50165 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50165 | 4n0nym4u5 with Zscaler |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50166
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50166 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Information Disclosure | 5062561 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Information Disclosure | 5062561 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50166 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50167
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50167 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50167 | Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50168
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50168 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50168 | Hyeonjin Choi (@d4m0n_8) of Out Of Bounds with Trend Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50169
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SMB Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50169 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50169 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50170
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper handling of insufficient permissions or privileges in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50170 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50170 | Chen Le Qi (@cplearns2h4ck) with STAR Labs SG Pte. Ltd. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50171
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Desktop Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Executive Summary: Missing authorization in Remote Desktop Server allows an unauthorized attacker to perform spoofing over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50171 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062572 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062572 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Spoofing | 5062570 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062553 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Spoofing | 5062553 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50171 | Philemon Orphee Favrod Ray Reskusich with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50172
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DirectX Graphics Kernel Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Allocation of resources without limits or throttling in Windows DirectX allows an authorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50172 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062572 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062572 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Denial of Service | 5062570 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50172 | cyanbamboo and b2ahex |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50173
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Installer Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50173 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50173 | JaGoTu with DCIT, a.s. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50176
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DirectX Graphics Kernel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Graphics Kernel allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50176 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Critical | Remote Code Execution | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50176 | b2ahex cyanbamboo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50177
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit the vulnerability? To exploit this vulnerability, an attacker would need to send a series of specially crafted MSMQ packets in a rapid sequence over HTTP to a MSMQ server. This could result in remote code execution on the server side. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50177 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Critical | Remote Code Execution | 5062561 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Critical | Remote Code Execution | 5062561 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Critical | Remote Code Execution | 5062560 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Critical | Remote Code Execution | 5062560 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Critical | Remote Code Execution | 5062557 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Critical | Remote Code Execution | 5062557 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Remote Code Execution | 5062624 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Remote Code Execution | 5062624 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Remote Code Execution | 5062624 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Remote Code Execution | 5062624 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Critical | Remote Code Execution | 5062632 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Critical | Remote Code Execution | 5062632 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Critical | Remote Code Execution | 5062592 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Critical | Remote Code Execution | 5062592 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Critical | Remote Code Execution | 5062597 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Critical | Remote Code Execution | 5062597 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Critical | Remote Code Execution | 5062560 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Critical | Remote Code Execution | 5062560 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Critical | Remote Code Execution | 5062557 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Critical | Remote Code Execution | 5062557 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062572 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062572 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Critical | Remote Code Execution | 5062570 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50177 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53131
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution. How could an attacker exploit this vulnerability? An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53131 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53131 | Kai Lu of Palo Alto Networks |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53132
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53132 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53132 | goodbyeselene with Trend Zero Day Initiative goodbyeselene with Trend Zero Day Initiative Anonymous goodbyeselene with Trend Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53133
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53133 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53133 | Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat Dongjun Kim (smlijun) with Ajou University, and working at ENKI WhiteHat Seongheun Hong (seongheunh) with Ajou University Pwnforr777 Hwiwon Lee (hwiwonl), SEC-agent team Taewoo (Tae_ω02) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53134
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53134 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53134 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53135
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53135 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53135 | cyanbamboo and b2ahex |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53136
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NT OS Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53136 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Information Disclosure | 5062561 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Information Disclosure | 5062561 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Information Disclosure | 5062554 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Information Disclosure | 5062552 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53136 | Bùi Quang Hiếu (@tykawaii98) with Crowdfense |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53137
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53137 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53137 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53138
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Executive Summary: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53138 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53138 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53140
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Transaction Manager Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Kernel Transaction Manager allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53140 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53140 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53141
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53141 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53141 | Marat Gayanov with Positive Technologies |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53142
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53142 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53142 | ChenJian with Sea Security Orca Team hazard hazard |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53143
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit the vulnerability? To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53143 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Remote Code Execution | 5062561 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Remote Code Execution | 5062561 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53143 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53144
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit the vulnerability? To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53144 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Remote Code Execution | 5062561 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Remote Code Execution | 5062561 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53144 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53145
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit the vulnerability? To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53145 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Remote Code Execution | 5062561 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Remote Code Execution | 5062561 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53145 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53147
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53147 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53147 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53148
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Executive Summary: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. FAQ: How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53148 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53148 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53149
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53149 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53149 | Aleksandr Koshelev from Crowdfense |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53151
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53151 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53151 | hazard |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53152
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Desktop Windows Manager Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Desktop Windows Manager allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word "Remote" in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to create a window and intentionally cause it to hang. This could be used to exploit the GhostWindow object use-after-free (UAF) vulnerability in the DWM process on the victim's system. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to have obtained low privileged code execution on target host first. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53152 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Remote Code Execution | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Remote Code Execution | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Remote Code Execution | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Remote Code Execution | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53152 | Varun Goel |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53153
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Executive Summary: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53153 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53153 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53154
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53154 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53154 | dungnm with Viettel Cyber Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53155
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? An authenticated attacker could create a crafted vhdx file and can call the vhdmp api with vhdx as one of the arguments. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53155 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53155 | Do Manh Dung & Nguyen Dang Nguyen of STAR Labs SG Pte. Ltd. (@starlabs_sg) working with Trend Zero Day Initiative Do Manh Dung & Nguyen Dang Nguyen of STAR Labs SG Pte. Ltd. (@starlabs_sg) working with Trend Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53156
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Storage Port Driver Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain kernel memory content. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53156 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53156 | Anonymous DEVCORE - Angelboy (@scwuaptx) from DEVCORE Research Team with Trend Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53716
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53716 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062572 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062572 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Denial of Service | 5062570 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53716 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53718
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53718 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Elevation of Privilege | 5062624 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Elevation of Privilege | 5062632 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53718 | dungnm with Viettel Cyber Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53719
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Executive Summary: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53719 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53719 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53720
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR:L). What does that mean for this vulnerability? Exploitation of this vulnerability requires an authorized attacker on the domain to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53720 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Remote Code Execution | 5062624 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Remote Code Execution | 5062632 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Remote Code Execution | 5062592 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Remote Code Execution | 5062597 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Remote Code Execution | 5062560 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Remote Code Execution | 5062557 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062572 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Remote Code Execution | 5062570 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5062553 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53720 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53721
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53721 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53721 | Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53722
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Services Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53722 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Denial of Service | 5062561 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Denial of Service | 5062561 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Denial of Service | 5062560 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Denial of Service | 5062560 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Denial of Service | 5062554 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Denial of Service | 5062552 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Denial of Service | 5062632 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Denial of Service | 5062632 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Denial of Service | 5062592 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Denial of Service | 5062592 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Denial of Service | 5062597 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Denial of Service | 5062597 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Denial of Service | 5062560 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Denial of Service | 5062560 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Denial of Service | 5062557 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062572 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062572 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Denial of Service | 5062570 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5062553 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53722 | Erik Egsgard with Field Effect |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53723
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Numeric truncation error in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53723 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53723 | Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative pwnky |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53724
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level. Please refer to AppContainer isolation and Mandatory Integrity Control for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53724 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53724 | Anonymous Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53725
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level. Please refer to AppContainer isolation and Mandatory Integrity Control for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53725 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53725 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53726
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level. Please refer to AppContainer isolation and Mandatory Integrity Control for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53726 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53726 | anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53728
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Exposure of sensitive information to an unauthorized actor in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53728 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 (on-premises) version 9.1 | 5064483 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
9.1.39 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53728 | Ha Anh Hoang with Viettel Cyber Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-47954
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network. FAQ: How could an attacker exploit the vulnerability? An attacker could use the unsanitized parameter into a SQL query to trigger SQL Injection. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain sysadmin privileges. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-47954 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2022 for x64-based Systems (CU 20) | 5063814 (Security Update) | Important | Elevation of Privilege | 5059390 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4210.1 |
Maybe | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5063756 (Security Update) | Important | Elevation of Privilege | 5058712 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1145.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-47954 | Fabiano Amorim with Pythian |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53731
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53731 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002756 (Security Update) | Critical | Remote Code Execution | 5002742 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002756 (Security Update) | Critical | Remote Code Execution | 5002742 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53731 | 0x140ce[LLMole] |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53732
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53732 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Office for Android | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.19127.20000 |
Maybe | None | |
Microsoft Office for Universal | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.14326.22618 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53732 | Arnaud Lubin |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53733
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53733 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002771 (Security Update) 5002772 (Security Update) |
Critical | Remote Code Execution | 5002760 5002759 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1002 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002769 (Security Update) 5002770 (Security Update) |
Critical | Remote Code Execution | 5002754 5002753 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20041 |
Maybe | None |
Microsoft Word 2016 (32-bit edition) | 5002763 (Security Update) | Critical | Remote Code Execution | 5002745 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002763 (Security Update) | Critical | Remote Code Execution | 5002745 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53733 | cdbb6164ddfda2b210fd348442322115 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53734
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to be tricked into opening a malicious file in Visio. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53734 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-53734 | c0d3nh4ck with Zscaler's ThreatLabz |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53735
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53735 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002758 (Security Update) | Important | Remote Code Execution | 5002749 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002758 (Security Update) | Important | Remote Code Execution | 5002749 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Office Online Server | 5002752 (Security Update) | Important | Remote Code Execution | 5002740 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20034 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53735 | wh1tc & Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53736
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53736 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002771 (Security Update) 5002772 (Security Update) |
Important | Information Disclosure | 5002760 5002759 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
16.0.5513.1002 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002769 (Security Update) 5002770 (Security Update) |
Important | Information Disclosure | 5002754 5002753 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
16.0.10417.20041 |
Maybe | None |
Microsoft Word 2016 (32-bit edition) | 5002763 (Security Update) | Important | Information Disclosure | 5002745 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002763 (Security Update) | Important | Information Disclosure | 5002745 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53736 | wh1tc in Kunlun lab, devoke, Zhiniang Peng with HUST wh1tc in Kunlun lab, devoke, Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53737
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53737 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002758 (Security Update) | Important | Remote Code Execution | 5002749 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002758 (Security Update) | Important | Remote Code Execution | 5002749 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Office Online Server | 5002752 (Security Update) | Important | Remote Code Execution | 5002740 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20034 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53737 | wh1tc in Kunlun lab & devoke & Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53738
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53738 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Word 2016 (32-bit edition) | 5002763 (Security Update) | Important | Remote Code Execution | 5002745 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002763 (Security Update) | Important | Remote Code Execution | 5002745 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53738 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53739
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53739 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002758 (Security Update) | Important | Remote Code Execution | 5002749 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002758 (Security Update) | Important | Remote Code Execution | 5002749 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Office Online Server | 5002752 (Security Update) | Important | Remote Code Execution | 5002740 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20034 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53739 | wh1tc in Kunlun lab, devoke & Zhiniang Peng with HUST wh1tc in Kunlun lab, devoke & Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53740
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53740 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002756 (Security Update) | Critical | Remote Code Execution | 5002742 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002756 (Security Update) | Critical | Remote Code Execution | 5002742 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53740 | Li Shuang and willJ with Vulnerability Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53765
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Stack Hub Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Executive Summary: Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? This vulnerability could disclose administrator account passwords in the logs. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53765 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Stack Hub | Release Notes (Security Update) | Important | Information Disclosure | Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
102.10.2.11 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-53765 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53766
MITRE NVD Issuing CNA: Microsoft |
CVE Title: GDI+ Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the privilege required is none (PR:N) and user interaction is none (UI:N). What does that mean for this vulnerability? An attacker doesn't require any privileges on the systems hosting the web services. Successful exploitation of this vulnerability could cause Remote Code Execution or Information Disclosure on web services that are parsing documents that contain a specially crafted metafile, without the involvement of a victim user. According to the CVSS metric, the attack vector is network (AV:N). How could an attacker exploit the vulnerability? An attacker could trigger this vulnerability by convincing a victim to download and open a document that contains a specially crafted metafile. In the worst-case scenario, an attacker could trigger this vulnerability on web services by uploading documents containing a specially crafted metafile (AV:N) without user interaction. When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53766 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Office for Android | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.19127.20000 |
Maybe | None | |
Microsoft Office for Universal | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.14326.22618 |
Maybe | None | |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Critical | Remote Code Execution | 5062561 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Critical | Remote Code Execution | 5062561 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Critical | Remote Code Execution | 5062560 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Critical | Remote Code Execution | 5062560 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Critical | Remote Code Execution | 5062557 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Critical | Remote Code Execution | 5062557 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Critical | Remote Code Execution | 5062554 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Critical | Remote Code Execution | 5062552 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Remote Code Execution | 5062624 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Remote Code Execution | 5062624 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Remote Code Execution | 5062624 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Remote Code Execution | 5062624 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Critical | Remote Code Execution | 5062632 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Critical | Remote Code Execution | 5062632 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Critical | Remote Code Execution | 5062592 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Critical | Remote Code Execution | 5062592 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Critical | Remote Code Execution | 5062597 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Critical | Remote Code Execution | 5062597 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Critical | Remote Code Execution | 5062560 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Critical | Remote Code Execution | 5062560 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Critical | Remote Code Execution | 5062557 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Critical | Remote Code Execution | 5062557 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062572 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062572 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Critical | Remote Code Execution | 5062570 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5062553 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53766 | Gábor Selján with Check Point Research |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53769
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Security App Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53769 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Security App | (Security Update) | Important | Spoofing | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1000.27840.1000.0 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-53769 | Jimmy Bayne of IBM X-Force |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50157
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Executive Summary: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR:L). What does that mean for this vulnerability? Exploitation of this vulnerability requires an authorized attacker on the domain to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. How could an attacker exploit this vulnerability? An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50157 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Important | Information Disclosure | 5062624 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Important | Information Disclosure | 5062632 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Information Disclosure | 5062592 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Information Disclosure | 5062597 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Information Disclosure | 5062560 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Information Disclosure | 5062557 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062572 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Information Disclosure | 5062570 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5062553 |
Base: 5.7 Temporal: 5.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50157 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50155
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited the vulnerability could elevate from a low integrity level up to a medium integrity level. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50155 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Important | Elevation of Privilege | 5062561 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Important | Elevation of Privilege | 5062554 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Important | Elevation of Privilege | 5062552 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Important | Elevation of Privilege | 5062592 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Important | Elevation of Privilege | 5062597 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Important | Elevation of Privilege | 5062560 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Important | Elevation of Privilege | 5062557 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062572 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Important | Elevation of Privilege | 5062570 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5062553 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50155 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53778
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTLM Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53778 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5063889 (SecurityUpdate) | Critical | Elevation of Privilege | 5062561 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 for x64-based Systems | 5063889 (SecurityUpdate) | Critical | Elevation of Privilege | 5062561 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21100 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5063871 (Security Update) | Critical | Elevation of Privilege | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5063871 (Security Update) | Critical | Elevation of Privilege | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5063877 (Security Update) | Critical | Elevation of Privilege | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5063877 (Security Update) | Critical | Elevation of Privilege | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Critical | Elevation of Privilege | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Critical | Elevation of Privilege | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5063709 (SecurityUpdate) | Critical | Elevation of Privilege | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6216 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5063709 (SecurityUpdate) | Critical | Elevation of Privilege | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5063709 (SecurityUpdate) | Critical | Elevation of Privilege | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5063709 (SecurityUpdate) | Critical | Elevation of Privilege | 5062554 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6216 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5063875 (Security Update) | Critical | Elevation of Privilege | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5063875 (Security Update) | Critical | Elevation of Privilege | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5768 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5063875 (Security Update) | Critical | Elevation of Privilege | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5063875 (Security Update) | Critical | Elevation of Privilege | 5062552 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5768 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Elevation of Privilege | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Elevation of Privilege | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Elevation of Privilege | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5063888 (MonthlyRollup) 5063948 (SecurityOnly) |
Critical | Elevation of Privilege | 5062624 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23471 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Critical | Elevation of Privilege | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5063947 (MonthlyRollup) 5063927 (SecurityOnly) |
Critical | Elevation of Privilege | 5062632 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27872 |
Yes | None |
Windows Server 2012 | 5063906 (MonthlyRollup) | Critical | Elevation of Privilege | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5063906 (MonthlyRollup) | Critical | Elevation of Privilege | 5062592 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25622 |
Yes | None |
Windows Server 2012 R2 | 5063950 (MonthlyRollup) | Critical | Elevation of Privilege | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5063950 (MonthlyRollup) | Critical | Elevation of Privilege | 5062597 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22725 |
Yes | None |
Windows Server 2016 | 5063871 (Security Update) | Critical | Elevation of Privilege | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5063871 (Security Update) | Critical | Elevation of Privilege | 5062560 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8330 |
Yes | None |
Windows Server 2019 | 5063877 (Security Update) | Critical | Elevation of Privilege | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5063877 (Security Update) | Critical | Elevation of Privilege | 5062557 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7678 |
Yes | None |
Windows Server 2022 | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5063880 (SecurityUpdate) 5063812 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5062572 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4052 10.0.20348.3989 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5063899 (SecurityUpdate) | Critical | Elevation of Privilege | 5062570 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1791 |
Yes | None |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5062553 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53778 | Tianze Ding (@D1iv3) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53779
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.7
Executive Summary: Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? To successfully exploit this vulnerability, an attacker would need to have elevated access to certain attributes of the dMSA, specifically:
What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain domain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Moderate | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53779 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2025 | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Moderate | Elevation of Privilege | 5062553 |
Base: 7.2 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5063878 (Security Update) 5064010 (SecurityHotpatchUpdate) |
Moderate | Elevation of Privilege | 5062553 |
Base: 7.2 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.4946 10.0.26100.4851 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53779 | Yuval Gordon with Akamai |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53783
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Teams Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53783 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Teams for Android | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1416/1.0.0.2025102802 |
Maybe | None | |
Microsoft Teams for Desktop | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
25122.1415.3698.6812 |
Maybe | None | |
Microsoft Teams for iOS | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.10.1 (100772025102901) |
Maybe | None | |
Microsoft Teams for Mac | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
25122.1207.3700.1444 |
No | None | |
Teams for D365 Guides Hololens | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
907.2505.29001.0 |
Maybe | None | |
Teams for D365 Remote Assist HoloLens | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
316.2505.28001 |
Maybe | None | |
Teams Panels | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1449/1.0.97.2025102203 |
Maybe | None | |
Teams Phones | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1449/1.0.94.2025168802 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53783 | Anonymous working with Trend Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53784
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53784 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.100.25081015 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53784 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53788
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Time-of-check time-of-use (toctou) race condition in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53788 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Subsystem for Linux (WSL2) | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2.5.10 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-53788 | Nitesh Surana (niteshsurana.com) and Nelson William Gamazo Sanchez of Trend Research with Trend Micro |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53789
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows StateRepository API Server file Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Missing authentication for critical function in Windows StateRepository API allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would gain the rights of the user that is running the affected application. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53789 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5062561 (Security Update) | Important | Elevation of Privilege | 5060998 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21073 |
Yes | None |
Windows 10 for x64-based Systems | 5062561 (Security Update) | Important | Elevation of Privilege | 5060998 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21073 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5062560 (Security Update) | Important | Elevation of Privilege | 5061010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5062560 (Security Update) | Important | Elevation of Privilege | 5061010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5062557 (Security Update) | Important | Elevation of Privilege | 5060531 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5062557 (Security Update) | Important | Elevation of Privilege | 5060531 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5062554 (Security Update) | Important | Elevation of Privilege | 5060533 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6093 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5062554 (Security Update) | Important | Elevation of Privilege | 5060533 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6093 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5062554 (Security Update) | Important | Elevation of Privilege | 5060533 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6093 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5062554 (Security Update) | Important | Elevation of Privilege | 5060533 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6093 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5062554 (Security Update) | Important | Elevation of Privilege | 5060533 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6093 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5062554 (Security Update) | Important | Elevation of Privilege | 5060533 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6093 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5062552 (Security Update) | Important | Elevation of Privilege | 5060999 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5624 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5062552 (Security Update) | Important | Elevation of Privilege | 5060999 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5624 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5062552 (Security Update) | Important | Elevation of Privilege | 5060999 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5624 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5062552 (Security Update) | Important | Elevation of Privilege | 5060999 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5624 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5062553 (Security Update) | Important | Elevation of Privilege | 5060842 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5062553 (Security Update) | Important | Elevation of Privilege | 5060842 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
Windows Server 2016 | 5062560 (Security Update) | Important | Elevation of Privilege | 5061010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5062560 (Security Update) | Important | Elevation of Privilege | 5061010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows Server 2019 | 5062557 (Security Update) | Important | Elevation of Privilege | 5060531 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5062557 (Security Update) | Important | Elevation of Privilege | 5060531 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows Server 2022 | 5062572 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3932 |
Yes | None | |
Windows Server 2022 (Server Core installation) | 5062572 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3932 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5062570 (Security Update) | Important | Elevation of Privilege | 5060118 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1732 |
Yes | None |
Windows Server 2025 | 5062553 (Security Update) | Important | Elevation of Privilege | 5060842 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5062553 (Security Update) | Important | Elevation of Privilege | 5060842 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53789 | R4nger with CyberKunLun & Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53793
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Stack Hub Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? System internal configuration could be disclosed by this vulnerability. What should users do to protect themselves? Users can follow the instructions in the release notes to update the Azure Stack Hub environment to latest version 1.2501.1.47. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53793 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Stack Hub 2406 | Release Notes (Security Update) Release Notes (Security Update) |
Critical | Information Disclosure | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.2406.1.23 |
No | None | |
Azure Stack Hub 2408 | Release Notes (Security Update) Release Notes (Security Update) |
Critical | Information Disclosure | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.2408.1.50 |
No | None | |
Azure Stack Hub 2501 | Release Notes (Security Update) Release Notes (Security Update) |
Critical | Information Disclosure | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.2501.1.47 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-53793 | nxhoang99 with VCSLab of Viettel Cyber Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-8583
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-8583 Inappropriate implementation in Permissions
CVSS: None Executive Summary: Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-8583 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-8583 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-8579
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome
CVSS: None Executive Summary: Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-8579 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-8579 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-8577
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture
CVSS: None Executive Summary: Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-8577 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-8577 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-48807
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? A race condition is triggered when the admin begins administering from the host system and not a guest or nested guest. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? At the time the authorized attacker sends a specially crafted request an administrator needs to take action on the host. According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? An attacker on a nested guest VM who successfully exploited the vulnerability could escape their VM and gain admin privilege on the guest that is serving as the host. For diagrams and more detailed information about nested VMs please see Run Hyper-V in a Virtual Machine with Nested Virtualization. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-48807 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for x64-based Systems | 5062560 (Security Update) | Critical | Remote Code Execution | 5061010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5062557 (Security Update) | Critical | Remote Code Execution | 5060531 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5062554 (Security Update) | Critical | Remote Code Execution | 5060533 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6093 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5062554 (Security Update) | Critical | Remote Code Execution | 5060533 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6093 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5062552 (Security Update) | Critical | Remote Code Execution | 5060999 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5624 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5062552 (Security Update) | Critical | Remote Code Execution | 5060999 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5624 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5062552 (Security Update) | Critical | Remote Code Execution | 5060999 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5624 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5062552 (Security Update) | Critical | Remote Code Execution | 5060999 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5624 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5062553 (Security Update) | Critical | Remote Code Execution | 5060842 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5062553 (Security Update) | Critical | Remote Code Execution | 5060842 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
Windows Server 2016 | 5062560 (Security Update) | Critical | Remote Code Execution | 5061010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5062560 (Security Update) | Critical | Remote Code Execution | 5061010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8246 |
Yes | None |
Windows Server 2019 | 5062557 (Security Update) | Critical | Remote Code Execution | 5060531 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5062557 (Security Update) | Critical | Remote Code Execution | 5060531 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7558 |
Yes | None |
Windows Server 2022 | 5062572 (Security Update) | Critical | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3932 |
Yes | None | |
Windows Server 2022 (Server Core installation) | 5062572 (Security Update) | Critical | Remote Code Execution | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3932 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5062570 (Security Update) | Critical | Remote Code Execution | 5060118 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1732 |
Yes | None |
Windows Server 2025 | 5062553 (Security Update) | Critical | Remote Code Execution | 5060842 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5062553 (Security Update) | Critical | Remote Code Execution | 5060842 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.4652 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-48807 | QWangWang & zcgonvh |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53792
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Portal Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53792 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Portal | Critical | Elevation of Privilege | None | Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-53792 | nxhoang99 with VCSLab of Viettel Cyber Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53767
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure OpenAI Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:10.0/TemporalScore:8.7
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53767 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Open AI | Critical | Elevation of Privilege | None | Base: 10.0 Temporal: 8.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-53767 | Daniel Santos with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53774
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Critical | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53774 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Copilot's Business Chat | Critical | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-53774 | Jun Kokatsu |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53787
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Critical | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53787 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Copilot's Business Chat | Critical | Information Disclosure | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-53787 | Luke Papandrea, Microsoft Corporation |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2025-49755
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Executive Summary: User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. What is the version information for this release?
According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability? An attacker using either a specially-crafted page or a content script injected into a target page can show an extension's popup over a permission prompt or screen share dialog allowing the extension to spoof parts of the prompt's UI that shows its origin. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Low | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49755 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge for Android | Release Notes (Security Update) | Low | Spoofing | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-49755 | Farras Givari with Meta4sec |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49707
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Virtual Machines Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.9/TemporalScore:6.9
Executive Summary: Improper access control in Azure Virtual Machines allows an authorized attacker to perform spoofing locally. FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Critical | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49707 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
DCadsv5-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
DCasv5-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
DCedsv5-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
DCesv5-series - Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
DCesv6-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
ECadsv5-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
ECasv5-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
ECedsv5-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
ECesv5-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Ecesv6-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
NCCadsH100v5-series Azure VM | Critical | Spoofing | None | Base: 7.9 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-49707 | Ming-Wei Shih with Microsoft Ahmad Abdullateef with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49712
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. How could an attacker exploit the vulnerability? In a network-based attack, an attacker authenticated as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server. I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running? Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49712 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002771 (Security Update) | Important | Remote Code Execution | 5002760 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5513.1002 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002769 (Security Update) | Important | Remote Code Execution | 5002754 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20041 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-49712 | Railgun with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2025-49736
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Executive Summary: The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. What is the version information for this release?
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. Mitigations: None Workarounds: None Revision: 1.0    12-Aug-25     Information published. |
Moderate | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49736 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge for Android | Release Notes (Security Update) | Moderate | Spoofing | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
139.0.3405.86 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-49736 | Alwi Al Hadad with Meta4sec - Komunitas Siber UNM |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-6484
MITRE NVD Issuing CNA: 36c7be3b-2937-45df-85ea-ca7133ea542c |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Jul-25     Information published. 1.1    01-Aug-25     Added reaper to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-6484 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | reaper (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
3.1.1-19 |
Unknown | None | |
CBL Mariner 2.0 x64 | reaper (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
3.1.1-19 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-6484 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-7730
MITRE NVD Issuing CNA: patrick@puiterwijk.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-May-25     Information published. 1.1    05-Aug-25     Added qemu to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7730 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
8.2.0-14 |
Unknown | None | |
Azure Linux 3.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
8.2.0-14 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-7730 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-45231
MITRE NVD Issuing CNA: infosec@edk2.groups.io |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-24     Information published. 1.1    30-Jun-24     Information published. 2.0    06-Aug-25     Added edk2 to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-45231 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | edk2 (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
20240223gitedc6681206c1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | edk2 (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
20240223gitedc6681206c1-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
20230301gitf80f052277c8-42 1.0.1-3 |
None | ||
CBL Mariner 2.0 x64 | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
20230301gitf80f052277c8-42 1.0.1-3 |
None |
CVE ID | Acknowledgements |
CVE-2023-45231 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50080
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50080 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50080 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50087
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50087 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50087 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38000
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38000 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38000 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38001
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38001 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38001 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38045
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38045 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38045 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38061
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38061 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38061 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38074
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38074 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38074 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38075
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38075 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38075 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38086
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38086 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38086 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38108
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38108 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38108 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38109
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38109 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38109 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38110
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38110 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38110 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38117
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38117 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38117 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38118
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38118 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38118 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38119
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38119 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38119 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38148
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38148 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38148 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38153
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38153 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38153 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38160
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38160 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38160 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38159
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38159 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38159 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38167
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38167 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38167 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38173
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38173 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38173 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38190
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38190 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38190 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38191
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38191 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38191 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38198
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38198 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38198 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38211
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38211 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38211 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38212
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38212 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38212 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38213
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38213 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38213 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38227
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38227 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38227 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38226
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38226 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38226 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38229
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38229 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38229 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38249
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38249 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38249 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38259
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38259 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38259 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38262
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38262 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38262 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38280
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38280 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38280 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38282
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38282 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38282 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38283
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38283 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38283 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38290
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38290 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38290 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38293
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38293 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38293 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38304
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38304 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38304 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38324
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38324 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38324 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38326
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38326 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38326 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38336
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38336 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38336 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38337
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38337 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38337 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38345
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38345 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38345 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38346
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38346 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38346 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-49133
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-49133 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | libtpms (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H |
0.9.6-8 |
Unknown | None | |
Azure Linux 3.0 x64 | libtpms (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H |
0.9.6-8 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-49133 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-6069
MITRE NVD Issuing CNA: cna@python.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Jul-25     Information published. 2.0    07-Aug-25     Added python3 to Azure Linux 3.0 Added python3 to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-6069 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | python3 (CBL-Mariner) | Unknown | Unknown | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
3.12.9-3 |
Unknown | None | |
Azure Linux 3.0 x64 | python3 (CBL-Mariner) | Unknown | Unknown | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
3.12.9-3 |
Unknown | None | |
CBL Mariner 2.0 ARM | python3 (CBL-Mariner) | Unknown | Unknown | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
3.9.19-14 |
Unknown | None | |
CBL Mariner 2.0 x64 | python3 (CBL-Mariner) | Unknown | Unknown | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
3.9.19-14 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-6069 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50181
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Jul-25     Information published. 2.0    07-Aug-25     Added python-urllib3 to Azure Linux 3.0 Added python3 to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50181 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | python-urllib3 (CBL-Mariner) | Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.0.7-2 |
Unknown | None | |
Azure Linux 3.0 x64 | python-urllib3 (CBL-Mariner) | Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.0.7-2 |
Unknown | None | |
CBL Mariner 2.0 ARM | python3 (CBL-Mariner) | Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
3.9.19-14 |
Unknown | None | |
CBL Mariner 2.0 x64 | python3 (CBL-Mariner) | Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
3.9.19-14 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50181 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-45229
MITRE NVD Issuing CNA: infosec@edk2.groups.io |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-24     Information published. 1.1    30-Jun-24     Information published. 2.0    06-Aug-25     Added edk2 to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-45229 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | edk2 (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
20240223gitedc6681206c1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | edk2 (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
20240223gitedc6681206c1-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
20230301gitf80f052277c8-42 1.0.1-3 |
None | ||
CBL Mariner 2.0 x64 | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
20230301gitf80f052277c8-42 1.0.1-3 |
None |
CVE ID | Acknowledgements |
CVE-2023-45229 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-38796
MITRE NVD Issuing CNA: infosec@edk2.groups.io |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    27-May-25     Information published. 2.0    06-Aug-25     Added edk2 to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-38796 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | edk2 (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L |
20240524git3e722403cd16-8 |
Unknown | None | |
Azure Linux 3.0 x64 | edk2 (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L |
20240524git3e722403cd16-8 |
Unknown | None | |
CBL Mariner 2.0 ARM | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L |
20230301gitf80f052277c8-42 1.0.1-13 |
None | ||
CBL Mariner 2.0 x64 | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L |
20230301gitf80f052277c8-42 1.0.1-13 |
None |
CVE ID | Acknowledgements |
CVE-2024-38796 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50077
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50077 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50077 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50078
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50078 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50078 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50083
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50083 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50083 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50086
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50086 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50086 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50092
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50092 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50092 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50097
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50097 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50097 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50099
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50099 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50099 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50098
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:2.7/TemporalScore:2.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50098 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 2.7 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 2.7 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50098 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50104
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:2.7/TemporalScore:2.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50104 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 2.7 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 2.7 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50104 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-5025
MITRE NVD Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-5025 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-5025 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-7519
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:6.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-7519 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | polkit (CBL-Mariner) | Unknown | Unknown | Base: 6.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
123-3 |
Unknown | None | |
Azure Linux 3.0 x64 | polkit (CBL-Mariner) | Unknown | Unknown | Base: 6.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
123-3 |
Unknown | None | |
CBL Mariner 2.0 ARM | polkit (CBL-Mariner) | Unknown | Unknown | Base: 6.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.119-4 |
Unknown | None | |
CBL Mariner 2.0 x64 | polkit (CBL-Mariner) | Unknown | Unknown | Base: 6.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
0.119-4 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-7519 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-5455
MITRE NVD Issuing CNA: a59d8014-47c4-4630-ab43-e1b13cbe58e3 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-5455 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | qtbase (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.3-4 |
Unknown | None | |
Azure Linux 3.0 x64 | qtbase (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.3-4 |
Unknown | None | |
CBL Mariner 2.0 ARM | qt5-qtbase (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
5.12.11-18 |
Unknown | None | |
CBL Mariner 2.0 x64 | qt5-qtbase (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
5.12.11-18 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-5455 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-49176
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-49176 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H |
1.20.10-16 |
Unknown | None | |
CBL Mariner 2.0 x64 | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H |
1.20.10-16 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-49176 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-49178
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-49178 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
24.1.6-2 |
Unknown | None | |
Azure Linux 3.0 x64 | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
24.1.6-2 |
Unknown | None | |
CBL Mariner 2.0 ARM | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.20.10-16 |
Unknown | None | |
CBL Mariner 2.0 x64 | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.20.10-16 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-49178 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-49179
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-49179 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H |
24.1.6-2 |
Unknown | None | |
Azure Linux 3.0 x64 | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H |
24.1.6-2 |
Unknown | None | |
CBL Mariner 2.0 ARM | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H |
1.20.10-16 |
Unknown | None | |
CBL Mariner 2.0 x64 | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H |
1.20.10-16 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-49179 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-6140
MITRE NVD Issuing CNA: cna@vuldb.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-6140 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | doxygen (CBL-Mariner) | Unknown | Unknown | Base: 3.3 Temporal: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
1.9.8-2 |
Unknown | None | |
Azure Linux 3.0 x64 | doxygen (CBL-Mariner) | Unknown | Unknown | Base: 3.3 Temporal: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
1.9.8-2 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-6140 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-54090
MITRE NVD Issuing CNA: security@apache.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. 2.0    07-Aug-25     Added httpd to CBL-Mariner 2.0 Added httpd to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-54090 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | httpd (CBL-Mariner) | Unknown | Unknown | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.4.65-1 |
Unknown | None | |
Azure Linux 3.0 x64 | httpd (CBL-Mariner) | Unknown | Unknown | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.4.65-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | httpd (CBL-Mariner) | Unknown | Unknown | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.4.65-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | httpd (CBL-Mariner) | Unknown | Unknown | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
2.4.65-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-54090 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-27308
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Mar-24     Information published. 1.1    30-Jun-24     Information published. 2.0    06-Aug-25     Added kata-containers to Azure Linux 3.0 Added rpm-ostree to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-27308 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kata-containers (CBL-Mariner) rpm-ostree (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.18.0.kata0-1 2024.4-1 |
None | ||
Azure Linux 3.0 x64 | kata-containers (CBL-Mariner) rpm-ostree (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.18.0.kata0-1 2024.4-1 |
None | ||
CBL Mariner 2.0 ARM | kata-containers (CBL-Mariner) kata-containers-cc (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.2.0.azl2-1 |
None | ||
CBL Mariner 2.0 x64 | kata-containers (CBL-Mariner) kata-containers-cc (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.2.0.azl2-1 |
None |
CVE ID | Acknowledgements |
CVE-2024-27308 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-4574
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Jul-25     Information published. 2.0    06-Aug-25     Added kata-containers to Azure Linux 3.0 Added rust to Azure Linux 3.0 Added azl-compliance to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-4574 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kata-containers (CBL-Mariner) rust (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
3.18.0.kata0-1 1.86.0-3 |
None | ||
Azure Linux 3.0 x64 | kata-containers (CBL-Mariner) rust (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
3.18.0.kata0-1 1.86.0-3 |
None | ||
CBL Mariner 2.0 ARM | azl-compliance (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
1.0.2-2 |
Unknown | None | |
CBL Mariner 2.0 x64 | azl-compliance (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
1.0.2-2 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-4574 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-37958
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-37958 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-37958 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38034
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38034 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38034 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38035
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38035 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38035 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38048
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38048 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38048 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38051
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38051 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38051 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38058
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38058 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38058 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38059
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38059 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38059 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38063
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38063 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38063 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38065
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38065 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38065 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38078
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38078 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38078 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38081
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38081 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38081 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38088
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38088 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38088 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38090
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38090 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38090 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38102
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38102 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38102 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38103
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38103 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38103 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38113
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38113 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38113 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38127
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38127 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38127 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38135
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38135 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38135 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38136
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38136 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38136 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38143
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38143 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38143 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38146
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38146 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38146 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38161
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38161 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38161 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38183
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38183 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38183 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38185
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38185 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38185 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38194
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38194 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38194 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38197
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38197 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38197 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38218
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38218 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38218 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38220
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38220 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38220 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38222
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38222 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38222 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38251
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38251 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38251 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38257
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38257 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38257 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38258
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38258 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38258 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38277
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38277 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38277 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38300
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38300 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38300 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38305
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38305 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38305 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-26819
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:2.9/TemporalScore:2.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-26819 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | libglvnd (CBL-Mariner) | Unknown | Unknown | Base: 2.9 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L |
1.7.0-3 |
Unknown | None | |
Azure Linux 3.0 x64 | libglvnd (CBL-Mariner) | Unknown | Unknown | Base: 2.9 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L |
1.7.0-3 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-26819 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38321
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38321 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38321 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38331
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38331 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38331 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-2955
MITRE NVD Issuing CNA: cve@gitlab.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Jul-25     Information published. 1.1    07-Aug-25     Added wireshark to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-2955 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | wireshark (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
4.4.7-1 |
Unknown | None | |
Azure Linux 3.0 x64 | wireshark (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
4.4.7-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-2955 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-53023
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-53023 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-53023 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38363
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38363 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38363 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38416
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38416 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38416 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38424
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38424 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38424 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-48916
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:8.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Aug-25     Information published. 2.0    11-Aug-25     Added ceph to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-48916 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 8.1 Temporal: 8.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 8.1 Temporal: 8.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | ceph (CBL-Mariner) | Unknown | Unknown | Base: 8.1 Temporal: 8.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
16.2.10-9 |
Unknown | None | |
CBL Mariner 2.0 x64 | ceph (CBL-Mariner) | Unknown | Unknown | Base: 8.1 Temporal: 8.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
16.2.10-9 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-48916 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-4948
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-4948 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | libsoup (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.4.4-8 |
Unknown | None | |
Azure Linux 3.0 x64 | libsoup (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.4.4-8 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-4948 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-1550
MITRE NVD Issuing CNA: cve-coordination@google.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Mar-25     Information published. 1.1    01-Aug-25     Added keras to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1550 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | keras (CBL-Mariner) | Unknown | Unknown | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.3.3-2 |
Unknown | None | |
Azure Linux 3.0 x64 | keras (CBL-Mariner) | Unknown | Unknown | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.3.3-2 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-1550 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-4853
MITRE NVD Issuing CNA: cve@gitlab.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Jul-25     Information published. 1.1    05-Aug-25     Added wireshark to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-4853 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | wireshark (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
4.4.7-1 |
Unknown | None | |
Azure Linux 3.0 x64 | wireshark (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
4.4.7-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-4853 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-43806
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    21-Dec-24     Information published. 2.0    11-Feb-25     Information published. 3.0    27-Mar-25     Information published. 4.0    29-Apr-25     Information published. 5.0    06-May-25     Information published. 6.0    11-Jul-25     Added cloud-hypervisor to CBL-Mariner 2.0 Added virtiofsd to CBL-Mariner 2.0 Added rust to CBL-Mariner 2.0 Added virtiofsd to Azure Linux 3.0 Added flux to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 7.0    06-Aug-25     Added kata-containers-cc to CBL-Mariner 2.0 Added cloud-hypervisor to CBL-Mariner 2.0 Added virtiofsd to CBL-Mariner 2.0 Added rust to CBL-Mariner 2.0 Added virtiofsd to Azure Linux 3.0 Added flux to Azure Linux 3.0 Added kata-containers to Azure Linux 3.0 Added kata-containers-cc to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-43806 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | flux (CBL-Mariner) kata-containers (CBL-Mariner) kata-containers-cc (CBL-Mariner) virtiofsd (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
0.194.5-2 3.2.0.azl4-1 1.8.0-3 |
None | ||
Azure Linux 3.0 x64 | flux (CBL-Mariner) kata-containers (CBL-Mariner) kata-containers-cc (CBL-Mariner) virtiofsd (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
0.194.5-2 3.2.0.azl4-1 1.8.0-3 |
None | ||
CBL Mariner 2.0 ARM | cloud-hypervisor (CBL-Mariner) kata-containers-cc (CBL-Mariner) rust (CBL-Mariner) virtiofsd (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
32.0-7 3.2.0.azl2-7 1.72.0-9 1.8.0-3 |
None | ||
CBL Mariner 2.0 x64 | cloud-hypervisor (CBL-Mariner) kata-containers-cc (CBL-Mariner) rust (CBL-Mariner) virtiofsd (CBL-Mariner) |
Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
32.0-7 3.2.0.azl2-7 1.72.0-9 1.8.0-3 |
None |
CVE ID | Acknowledgements |
CVE-2024-43806 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-4947
MITRE NVD Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Jul-25     Information published. 2.0    06-Aug-25     Added mysql to CBL-Mariner 2.0 Added cmake to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-4947 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | cmake (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
3.30.3-7 |
Unknown | None | |
Azure Linux 3.0 x64 | cmake (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
3.30.3-7 |
Unknown | None | |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-4947 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-4748
MITRE NVD Issuing CNA: 6b3ad84c-e1a6-4bf7-a703-f496b71e49db |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-4748 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | erlang (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
25.3.2.21-2 |
Unknown | None | |
CBL Mariner 2.0 x64 | erlang (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
25.3.2.21-2 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-4748 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50091
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50091 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50091 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-7545
MITRE NVD Issuing CNA: cna@vuldb.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-7545 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | binutils (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.41-7 |
Unknown | None | |
Azure Linux 3.0 x64 | binutils (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.41-7 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-7545 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38004
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38004 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38004 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38039
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38039 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38039 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38044
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38044 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38044 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38068
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38068 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38068 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38071
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38071 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38071 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38072
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38072 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38072 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38079
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38079 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38079 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38083
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38083 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38083 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38085
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38085 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38085 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38089
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38089 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38089 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38097
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38097 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38097 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38100
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38100 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38100 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38111
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38111 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38111 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38112
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38112 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38112 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38115
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38115 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38115 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38122
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38122 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38122 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38126
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38126 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38126 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38138
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38138 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38138 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38155
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38155 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38155 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38157
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38157 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38157 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38158
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38158 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38158 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38163
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38163 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38163 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38165
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38165 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38165 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38166
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38166 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38166 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38174
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38174 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38174 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38181
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38181 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38181 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38182
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38182 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38182 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38200
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38200 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38200 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38202
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38202 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38202 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38208
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38208 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38208 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38214
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38214 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38214 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38217
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38217 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38217 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38225
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38225 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38225 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38219
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38219 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38219 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38230
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38230 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38230 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38236
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38236 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38236 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38239
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38239 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38239 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38265
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38265 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38265 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38274
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38274 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38274 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38278
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38278 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38278 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38285
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38285 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38285 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38286
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38286 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38286 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38307
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38307 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38307 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38313
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38313 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38313 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38323
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38323 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38323 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38328
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38328 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38328 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38332
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38332 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38332 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38334
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38334 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38334 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38338
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38338 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38338 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38342
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38342 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38342 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38343
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38343 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38343 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38344
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38344 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38344 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38347
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38347 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38347 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38348
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38348 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38348 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-49177
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-49177 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L |
24.1.6-2 |
Unknown | None | |
Azure Linux 3.0 x64 | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L |
24.1.6-2 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-49177 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-4743
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-4743 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | SDL2 (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.30.9-1 |
Unknown | None | |
Azure Linux 3.0 x64 | SDL2 (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.30.9-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-4743 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-4304
MITRE NVD Issuing CNA: openssl-security@openssl.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Feb-23     Information published. 1.1    14-Feb-23     Added openssl to CBL-Mariner 1.0 1.2    06-Apr-24     Added hvloader to CBL-Mariner 2.0 1.3    30-Jun-24     Information published. 1.4    15-Aug-24     Information published. 2.0    06-Aug-25     Added edk2 to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added rust to CBL-Mariner 2.0 Added cloud-hypervisor to CBL-Mariner 2.0 Added openssl to CBL-Mariner 2.0 Added hvloader to Azure Linux 3.0 Added edk2 to Azure Linux 3.0 Added openssl to CBL-Mariner 1.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-4304 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
20240223gitedc6681206c1-1 1.0.1-4 |
None | ||
Azure Linux 3.0 x64 | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
20240223gitedc6681206c1-1 1.0.1-4 |
None | ||
CBL Mariner 1.0 ARM | openssl (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
1.1.1k-13 |
Unknown | None | |
CBL Mariner 1.0 x64 | openssl (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
1.1.1k-13 |
Unknown | None | |
CBL Mariner 2.0 ARM | cloud-hypervisor (CBL-Mariner) edk2 (CBL-Mariner) hvloader (CBL-Mariner) openssl (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
30.0-2 20230301gitf80f052277c8-42 1.0.1-3 1.1.1k-21 |
None | ||
CBL Mariner 2.0 x64 | cloud-hypervisor (CBL-Mariner) edk2 (CBL-Mariner) hvloader (CBL-Mariner) openssl (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
30.0-2 20230301gitf80f052277c8-42 1.0.1-3 1.1.1k-21 |
None |
CVE ID | Acknowledgements |
CVE-2022-4304 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-47268
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-47268 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | iputils (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
20211215-3 |
Unknown | None | |
CBL Mariner 2.0 x64 | iputils (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
20211215-3 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-47268 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-5791
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-5791 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kata-containers (CBL-Mariner) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
3.18.0.kata0-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kata-containers (CBL-Mariner) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
3.18.0.kata0-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | kata-containers-cc (CBL-Mariner) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
3.2.0.azl2-7 |
Unknown | None | |
CBL Mariner 2.0 x64 | kata-containers-cc (CBL-Mariner) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
3.2.0.azl2-7 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-5791 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50076
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50076 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50076 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50079
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50079 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50079 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50081
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:3.1/TemporalScore:3.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50081 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 3.1 Temporal: 3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 3.1 Temporal: 3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50081 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50082
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50082 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50082 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50084
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50084 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50084 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50085
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50085 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50085 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50093
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50093 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50093 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50094
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50094 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50094 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50096
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.4/TemporalScore:4.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50096 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.4 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.4 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50096 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50100
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:2.2/TemporalScore:2.2
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50100 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 2.2 Temporal: 2.2 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 2.2 Temporal: 2.2 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50100 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50101
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50101 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50101 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-50102
MITRE NVD Issuing CNA: secalert_us@oracle.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-50102 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | mysql (CBL-Mariner) | Unknown | Unknown | Base: 4.9 Temporal: 4.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
8.0.43-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-50102 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-1220
MITRE NVD Issuing CNA: security@php.net |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1220 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | php (CBL-Mariner) | Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
8.1.33-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | php (CBL-Mariner) | Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
8.1.33-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-1220 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-1735
MITRE NVD Issuing CNA: security@php.net |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-1735 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | php (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
8.1.33-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | php (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
8.1.33-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-1735 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-6491
MITRE NVD Issuing CNA: security@php.net |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-6491 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | php (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
8.1.33-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | php (CBL-Mariner) | Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
8.1.33-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-6491 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-53905
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.1/TemporalScore:4.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-53905 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | vim (CBL-Mariner) | Unknown | Unknown | Base: 4.1 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L |
9.1.1552-1 |
Unknown | None | |
Azure Linux 3.0 x64 | vim (CBL-Mariner) | Unknown | Unknown | Base: 4.1 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L |
9.1.1552-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | vim (CBL-Mariner) | Unknown | Unknown | Base: 4.1 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L |
9.1.1552-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | vim (CBL-Mariner) | Unknown | Unknown | Base: 4.1 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L |
9.1.1552-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-53905 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-53906
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.1/TemporalScore:4.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-53906 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | vim (CBL-Mariner) | Unknown | Unknown | Base: 4.1 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L |
9.1.1552-1 |
Unknown | None | |
Azure Linux 3.0 x64 | vim (CBL-Mariner) | Unknown | Unknown | Base: 4.1 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L |
9.1.1552-1 |
Unknown | None | |
CBL Mariner 2.0 ARM | vim (CBL-Mariner) | Unknown | Unknown | Base: 4.1 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L |
9.1.1552-1 |
Unknown | None | |
CBL Mariner 2.0 x64 | vim (CBL-Mariner) | Unknown | Unknown | Base: 4.1 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L |
9.1.1552-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-53906 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-49175
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-49175 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H |
24.1.6-2 |
Unknown | None | |
Azure Linux 3.0 x64 | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H |
24.1.6-2 |
Unknown | None | |
CBL Mariner 2.0 ARM | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H |
1.20.10-16 |
Unknown | None | |
CBL Mariner 2.0 x64 | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H |
1.20.10-16 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-49175 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-49180
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-49180 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
24.1.6-2 |
Unknown | None | |
Azure Linux 3.0 x64 | xorg-x11-server-Xwayland (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
24.1.6-2 |
Unknown | None | |
CBL Mariner 2.0 ARM | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.20.10-16 |
Unknown | None | |
CBL Mariner 2.0 x64 | xorg-x11-server (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.20.10-16 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-49180 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-22653
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-22653 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | yasm (CBL-Mariner) | Unknown | Unknown | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
1.3.0-17 |
Unknown | None | |
Azure Linux 3.0 x64 | yasm (CBL-Mariner) | Unknown | Unknown | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
1.3.0-17 |
Unknown | None | |
CBL Mariner 2.0 ARM | yasm (CBL-Mariner) | Unknown | Unknown | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
1.3.0-17 |
Unknown | None | |
CBL Mariner 2.0 x64 | yasm (CBL-Mariner) | Unknown | Unknown | Base: 4.8 Temporal: 4.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
1.3.0-17 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-22653 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-7546
MITRE NVD Issuing CNA: cna@vuldb.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-7546 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | binutils (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.41-7 |
Unknown | None | |
Azure Linux 3.0 x64 | binutils (CBL-Mariner) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.41-7 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-7546 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-48938
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-48938 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | gh (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
2.62.0-9 |
Unknown | None | |
Azure Linux 3.0 x64 | gh (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
2.62.0-9 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-48938 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-45310
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:3.6/TemporalScore:3.6
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Jan-25     Information published. 2.0    11-Feb-25     Information published. 3.0    05-Apr-25     Information published. 4.0    06-Aug-25     Added kata-containers to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added runc to Azure Linux 3.0 Added moby-runc to CBL-Mariner 2.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-45310 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | cri-tools (CBL-Mariner) kata-containers (CBL-Mariner) runc (CBL-Mariner) |
Unknown | Unknown | Base: 3.6 Temporal: 3.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N |
1.32.0-1 3.18.0.kata0-1 1.2.2-1 |
None | ||
Azure Linux 3.0 x64 | cri-tools (CBL-Mariner) kata-containers (CBL-Mariner) runc (CBL-Mariner) |
Unknown | Unknown | Base: 3.6 Temporal: 3.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N |
1.32.0-1 3.18.0.kata0-1 1.2.2-1 |
None | ||
CBL Mariner 2.0 ARM | moby-runc (CBL-Mariner) | Unknown | Unknown | Base: 3.6 Temporal: 3.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N |
1.1.9-8 |
Unknown | None | |
CBL Mariner 2.0 x64 | moby-runc (CBL-Mariner) | Unknown | Unknown | Base: 3.6 Temporal: 3.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N |
1.1.9-8 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-45310 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-4432
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-4432 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kata-containers (CBL-Mariner) | Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.18.0.kata0-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kata-containers (CBL-Mariner) | Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.18.0.kata0-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-4432 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-37987
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-37987 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-37987 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38003
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38003 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38003 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38037
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38037 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38037 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38040
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38040 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38040 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38043
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38043 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38043 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38052
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38052 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38052 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38062
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38062 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38062 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38066
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38066 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38066 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38077
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38077 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38077 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38080
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38080 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38080 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38084
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38084 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38084 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38087
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38087 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38087 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38092
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38092 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38092 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38107
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38107 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38107 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38123
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38123 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38123 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38131
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38131 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38131 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38142
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38142 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38142 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38145
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38145 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38145 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38147
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38147 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38147 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38149
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38149 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38149 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38170
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38170 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38170 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38180
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38180 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38180 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38184
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38184 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38184 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38192
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38192 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38192 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38193
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38193 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38193 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38215
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38215 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38215 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38231
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38231 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38231 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38244
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38244 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38244 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38245
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38245 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38245 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38260
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38260 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38260 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38275
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38275 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38275 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38263
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38263 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38263 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38310
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38310 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38310 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38320
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38320 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38320 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38312
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38312 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38312 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38319
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38319 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38319 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-37464
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-37464 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | cjose (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
0.6.2.2-7 |
Unknown | None | |
Azure Linux 3.0 x64 | cjose (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
0.6.2.2-7 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-37464 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-4603
MITRE NVD Issuing CNA: cna@vuldb.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-4603 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | ppp (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.5.0-1 |
Unknown | None | |
Azure Linux 3.0 x64 | ppp (CBL-Mariner) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.5.0-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-4603 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2015-3310
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2015-3310 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | ppp (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
2.5.0-1 |
Unknown | None | |
Azure Linux 3.0 x64 | ppp (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
2.5.0-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2015-3310 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38352
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38352 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38352 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38368
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38368 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38368 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38369
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38369 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38369 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38418
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38418 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38418 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38420
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38420 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38420 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38422
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38422 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38422 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38425
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38425 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38425 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38436
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38436 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38436 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38498
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38498 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38498 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-4565
MITRE NVD Issuing CNA: cve-coordination@google.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Jul-25     Information published. 2.0    29-Jul-25     Added protobuf to CBL-Mariner 2.0 Added protobuf to Azure Linux 3.0 2.1    07-Aug-25     Added protobuf to CBL-Mariner 2.0 Added protobuf to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-4565 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | protobuf (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
25.3-5 |
Unknown | None | |
Azure Linux 3.0 x64 | protobuf (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
25.3-5 |
Unknown | None | |
CBL Mariner 2.0 ARM | protobuf (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.17.3-4 |
Unknown | None | |
CBL Mariner 2.0 x64 | protobuf (CBL-Mariner) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.17.3-4 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-4565 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38354
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38354 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38354 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38362
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38362 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38362 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38365
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38365 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38365 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38415
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38415 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38415 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38419
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38419 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38419 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38428
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38428 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38428 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38429
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38429 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38429 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-38430
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Aug-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2025-38430 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None | |
Azure Linux 3.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
6.6.96.1-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-38430 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-4855
MITRE NVD Issuing CNA: cve@gitlab.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Jul-25     Information published. 1.1    07-Aug-25     Added wireshark to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-4855 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | wireshark (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
4.4.7-1 |
Unknown | None | |
Azure Linux 3.0 x64 | wireshark (CBL-Mariner) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
4.4.7-1 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-4855 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-1292
MITRE NVD Issuing CNA: openssl-security@openssl.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-May-22     Information published. 1.1    30-Jun-24     Information published. 1.2    29-Aug-24     Information published. 1.3    30-Aug-24     Information published. 1.4    31-Aug-24     Information published. 1.5    01-Sep-24     Information published. 1.6    02-Sep-24     Information published. 1.7    03-Sep-24     Information published. 1.8    05-Sep-24     Information published. 1.9    06-Sep-24     Information published. 2.0    07-Sep-24     Information published. 2.1    08-Sep-24     Information published. 2.2    11-Sep-24     Information published. 2.3    11-Aug-25     Added openssl to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0 Added hvloader to Azure Linux 3.0 |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-1292 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
20240223gitedc6681206c1-2 1.0.1-2 |
None | ||
Azure Linux 3.0 x64 | edk2 (CBL-Mariner) hvloader (CBL-Mariner) |
Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
20240223gitedc6681206c1-2 1.0.1-2 |
None | ||
CBL Mariner 1.0 ARM | openssl (CBL-Mariner) | Unknown | Unknown | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.1.1k-10 |
Unknown | None | |
CBL Mariner 1.0 x64 | openssl (CBL-Mariner) | Unknown | Unknown | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.1.1k-10 |
Unknown | None | |
CBL Mariner 2.0 ARM | openssl (CBL-Mariner) | Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
1.1.1k-15 |
Unknown | None | |
CBL Mariner 2.0 x64 | openssl (CBL-Mariner) | Unknown | Unknown | Base: 7.3 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
1.1.1k-15 |
Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-1292 | None |