Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
MicrosoftAzure File Sync CVE-2025-53729 Microsoft Azure File Sync Elevation of Privilege Vulnerability
MicrosoftAzure OpenAI CVE-2025-53767 Azure OpenAI Elevation of Privilege Vulnerability
MicrosoftAzure Portal CVE-2025-53792 Azure Portal Elevation of Privilege Vulnerability
MicrosoftAzure Stack CVE-2025-53793 Azure Stack Hub Information Disclosure Vulnerability
MicrosoftAzure Stack CVE-2025-53765 Azure Stack Hub Information Disclosure Vulnerability
MicrosoftAzure Virtual Machines CVE-2025-49707 Azure Virtual Machines Spoofing Vulnerability
MicrosoftAzure Virtual Machines CVE-2025-53781 Azure Virtual Machines Information Disclosure Vulnerability
MicrosoftDesktop Windows Manager CVE-2025-53152 Desktop Windows Manager Remote Code Execution Vulnerability
MicrosoftDesktop Windows Manager CVE-2025-50153 Desktop Windows Manager Elevation of Privilege Vulnerability
MicrosoftGitHub Copilot and Visual Studio CVE-2025-53773 GitHub Copilot and Visual Studio Remote Code Execution Vulnerability
MicrosoftGraphics Kernel CVE-2025-50176 DirectX Graphics Kernel Remote Code Execution Vulnerability
MicrosoftKernel Streaming WOW Thunk Service Driver CVE-2025-53149 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
MicrosoftKernel Transaction Manager CVE-2025-53140 Windows Kernel Transaction Manager Elevation of Privilege Vulnerability
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38163 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38126 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38165 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38158 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38157 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38155 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38138 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38122 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38085 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38089 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38083 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38072 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38079 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38112 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38115 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38111 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38097 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38100 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38166 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38274 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38278 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38265 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38236 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38239 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38285 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38323 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38328 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38313 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38286 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38307 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38200 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38202 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38182 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38174 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38181 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38208 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38219 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38230 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38225 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38214 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38217 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38185 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38194 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38197 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38146 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38161 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38183 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38251 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38257 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38258 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38218 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38220 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38222 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38088 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38090 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38102 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38065 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38078 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38081 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38135 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38136 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38143 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38103 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38113 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38127 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38277 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2025-4947 Unknown
6b3ad84c-e1a6-4bf7-a703-f496b71e49dbMariner CVE-2025-4748 Unknown
secalert_us@oracle.comMariner CVE-2025-50091 Unknown
cve-coordination@google.comMariner CVE-2025-1550 Unknown
cve@gitlab.comMariner CVE-2024-4853 Unknown
security-advisories@github.comMariner CVE-2024-43806 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38044 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38068 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38071 Unknown
cna@vuldb.comMariner CVE-2025-7545 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38004 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38039 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38321 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38331 Unknown
cve@gitlab.comMariner CVE-2024-2955 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38300 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38305 Unknown
cve@mitre.orgMariner CVE-2023-26819 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38424 Unknown
security-advisories@github.comMariner CVE-2024-48916 Unknown
secalert@redhat.comMariner CVE-2025-4948 Unknown
secalert_us@oracle.comMariner CVE-2025-53023 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38363 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38416 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38332 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38231 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38244 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38215 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38192 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38193 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38245 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38310 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38320 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38263 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38260 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38275 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38184 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38123 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38131 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38107 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38087 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38092 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38142 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38170 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38180 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38149 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38145 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38147 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38312 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38362 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38365 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38354 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38498 Unknown
cve-coordination@google.comMariner CVE-2025-4565 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38415 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38430 Unknown
cve@gitlab.comMariner CVE-2024-4855 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38429 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38419 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38428 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38436 Unknown
cve@mitre.orgMariner CVE-2015-3310 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38352 Unknown
cna@vuldb.comMariner CVE-2022-4603 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38319 Unknown
security-advisories@github.comMariner CVE-2023-37464 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38368 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38422 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38425 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38420 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38369 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38418 Unknown
secalert_us@oracle.comMariner CVE-2025-50082 Unknown
secalert_us@oracle.comMariner CVE-2025-50084 Unknown
secalert_us@oracle.comMariner CVE-2025-50081 Unknown
secalert_us@oracle.comMariner CVE-2025-50076 Unknown
secalert_us@oracle.comMariner CVE-2025-50079 Unknown
secalert_us@oracle.comMariner CVE-2025-50085 Unknown
secalert_us@oracle.comMariner CVE-2025-50100 Unknown
secalert_us@oracle.comMariner CVE-2025-50101 Unknown
secalert_us@oracle.comMariner CVE-2025-50096 Unknown
secalert_us@oracle.comMariner CVE-2025-50093 Unknown
secalert_us@oracle.comMariner CVE-2025-50094 Unknown
secalert@redhat.comMariner CVE-2025-5791 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38343 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38344 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38342 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38334 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38338 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38347 Unknown
openssl-security@openssl.orgMariner CVE-2022-4304 Unknown
cve@mitre.orgMariner CVE-2025-47268 Unknown
secalert@redhat.comMariner CVE-2022-4743 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38348 Unknown
secalert@redhat.comMariner CVE-2025-49177 Unknown
secalert_us@oracle.comMariner CVE-2025-50102 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38040 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38043 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38037 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-37987 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38003 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38052 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38080 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38084 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38077 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38062 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38066 Unknown
secalert@redhat.comMariner CVE-2025-4432 Unknown
security-advisories@github.comMariner CVE-2025-53905 Unknown
security-advisories@github.comMariner CVE-2025-53906 Unknown
security@php.netMariner CVE-2025-6491 Unknown
security@php.netMariner CVE-2025-1220 Unknown
security@php.netMariner CVE-2025-1735 Unknown
secalert@redhat.comMariner CVE-2025-49175 Unknown
security-advisories@github.comMariner CVE-2025-48938 Unknown
security-advisories@github.comMariner CVE-2024-45310 Unknown
cna@vuldb.comMariner CVE-2025-7546 Unknown
secalert@redhat.comMariner CVE-2025-49180 Unknown
cve@mitre.orgMariner CVE-2024-22653 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38063 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38191 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38190 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38198 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38212 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38211 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38160 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38153 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38159 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38173 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38167 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38262 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38259 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38280 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38283 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38282 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38227 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38213 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38226 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38249 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38229 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38000 Unknown
secalert_us@oracle.comMariner CVE-2025-50087 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38001 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38061 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38045 Unknown
36c7be3b-2937-45df-85ea-ca7133ea542cMariner CVE-2024-6484 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38034 Unknown
patrick@puiterwijk.orgMariner CVE-2024-7730 Unknown
secalert_us@oracle.comMariner CVE-2025-50080 Unknown
infosec@edk2.groups.ioMariner CVE-2023-45231 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38117 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38110 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38118 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38148 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38119 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38075 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38074 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38086 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38109 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38108 Unknown
secalert@redhat.comMariner CVE-2025-49176 Unknown
a59d8014-47c4-4630-ab43-e1b13cbe58e3Mariner CVE-2025-5455 Unknown
secalert@redhat.comMariner CVE-2025-49178 Unknown
cna@vuldb.comMariner CVE-2025-6140 Unknown
secalert@redhat.comMariner CVE-2025-49179 Unknown
secalert_us@oracle.comMariner CVE-2025-50098 Unknown
secalert_us@oracle.comMariner CVE-2025-50099 Unknown
secalert_us@oracle.comMariner CVE-2025-50104 Unknown
secalert@redhat.comMariner CVE-2025-7519 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2025-5025 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38048 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38035 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38051 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38059 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38058 Unknown
security-advisories@github.comMariner CVE-2024-27308 Unknown
security@apache.orgMariner CVE-2025-54090 Unknown
secalert@redhat.comMariner CVE-2025-4574 Unknown
openssl-security@openssl.orgMariner CVE-2022-1292 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-37958 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38337 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38336 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38345 Unknown
security-advisories@github.comMariner CVE-2025-49133 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38346 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38293 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38290 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38304 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38326 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2025-38324 Unknown
secalert_us@oracle.comMariner CVE-2025-50083 Unknown
secalert_us@oracle.comMariner CVE-2025-50078 Unknown
secalert_us@oracle.comMariner CVE-2025-50086 Unknown
secalert_us@oracle.comMariner CVE-2025-50097 Unknown
secalert_us@oracle.comMariner CVE-2025-50092 Unknown
security-advisories@github.comMariner CVE-2025-50181 Unknown
cna@python.orgMariner CVE-2025-6069 Unknown
infosec@edk2.groups.ioMariner CVE-2023-45229 Unknown
secalert_us@oracle.comMariner CVE-2025-50077 Unknown
infosec@edk2.groups.ioMariner CVE-2024-38796 Unknown
MicrosoftMicrosoft 365 Copilot's Business Chat CVE-2025-53787 Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
MicrosoftMicrosoft 365 Copilot's Business Chat CVE-2025-53774 Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2025-53142 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Dynamics 365 (on-premises) CVE-2025-49745 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics 365 (on-premises) CVE-2025-53728 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8582 Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8580 Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8581 Chromium: CVE-2025-8581 Inappropriate implementation in Extensions
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8578 Chromium: CVE-2025-8578 Use after free in Cast
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8576 Chromium: CVE-2025-8576 Use after free in Extensions
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8577 Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8583 Chromium: CVE-2025-8583 Inappropriate implementation in Permissions
ChromeMicrosoft Edge (Chromium-based) CVE-2025-8579 Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome
MicrosoftMicrosoft Edge for Android CVE-2025-49755 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
MicrosoftMicrosoft Edge for Android CVE-2025-49736 Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-25005 Microsoft Exchange Server Tampering Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-25006 Microsoft Exchange Server Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-25007 Microsoft Exchange Server Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-53786 Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-33051 Microsoft Exchange Server Information Disclosure Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2025-49743 Windows Graphics Component Elevation of Privilege Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2025-50165 Windows Graphics Component Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-53732 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-53740 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-53731 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53759 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53737 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53739 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53735 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-53741 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office PowerPoint CVE-2025-53761 Microsoft PowerPoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2025-53760 Microsoft SharePoint Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2025-49712 Microsoft SharePoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Visio CVE-2025-53730 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Visio CVE-2025-53734 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-53738 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-53736 Microsoft Word Information Disclosure Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-53784 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-53733 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Teams CVE-2025-53783 Microsoft Teams Remote Code Execution Vulnerability
MicrosoftRemote Access Point-to-Point Protocol (PPP) EAP-TLS CVE-2025-50159 Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability
MicrosoftRemote Desktop Server CVE-2025-50171 Remote Desktop Spoofing Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-50167 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-53155 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-49751 Windows Hyper-V Denial of Service Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-53723 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2025-48807 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2025-49758 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftSQL Server CVE-2025-24999 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftSQL Server CVE-2025-53727 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftSQL Server CVE-2025-49759 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftSQL Server CVE-2025-47954 Microsoft SQL Server Elevation of Privilege Vulnerability
MicrosoftStorage Port Driver CVE-2025-53156 Windows Storage Port Driver Information Disclosure Vulnerability
MicrosoftWeb Deploy CVE-2025-53772 Web Deploy Remote Code Execution Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53718 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53134 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-49762 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53147 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53154 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53137 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-53141 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2025-50170 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
MicrosoftWindows Connected Devices Platform Service CVE-2025-53721 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
MicrosoftWindows DirectX CVE-2025-53135 DirectX Graphics Kernel Elevation of Privilege Vulnerability
MicrosoftWindows DirectX CVE-2025-50172 DirectX Graphics Kernel Denial of Service Vulnerability
MicrosoftWindows Distributed Transaction Coordinator CVE-2025-50166 Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability
MicrosoftWindows File Explorer CVE-2025-50154 Microsoft Windows File Explorer Spoofing Vulnerability
MicrosoftWindows GDI+ CVE-2025-53766 GDI+ Remote Code Execution Vulnerability
MicrosoftWindows Installer CVE-2025-50173 Windows Installer Elevation of Privilege Vulnerability
MicrosoftWindows Kerberos CVE-2025-53779 Windows Kerberos Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-49761 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-53151 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Local Security Authority Subsystem Service (LSASS) CVE-2025-53716 Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
MicrosoftWindows Media CVE-2025-53131 Windows Media Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2025-53145 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2025-53143 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2025-50177 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2025-53144 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows NT OS Kernel CVE-2025-53136 NT OS Kernel Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-50158 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTLM CVE-2025-53778 Windows NTLM Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-53133 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows Push Notifications CVE-2025-53725 Windows Push Notifications Apps Elevation of Privilege Vulnerability
MicrosoftWindows Push Notifications CVE-2025-53724 Windows Push Notifications Apps Elevation of Privilege Vulnerability
MicrosoftWindows Push Notifications CVE-2025-50155 Windows Push Notifications Apps Elevation of Privilege Vulnerability
MicrosoftWindows Push Notifications CVE-2025-53726 Windows Push Notifications Apps Elevation of Privilege Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2025-53722 Windows Remote Desktop Services Denial of Service Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50157 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53153 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50163 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50162 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50164 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53148 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53138 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50156 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-49757 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53719 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-53720 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-50160 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Security App CVE-2025-53769 Windows Security App Spoofing Vulnerability
MicrosoftWindows SMB CVE-2025-50169 Windows SMB Remote Code Execution Vulnerability
MicrosoftWindows StateRepository API CVE-2025-53789 Windows StateRepository API Server file Elevation of Privilege Vulnerability
MicrosoftWindows Subsystem for Linux CVE-2025-53788 Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2025-50161 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2025-53132 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2025-50168 Win32k Elevation of Privilege Vulnerability

CVE-2025-49751 - Windows Hyper-V Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49751
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network.


FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to cause denial of service on the Hyper-V host environment.


According to the CVSS metric, the Hyper-V attack vector is adjacent (AV:A). What does that mean for this vulnerability?

Where the attack vector metric is Adjacent (A), this represents virtual machines connected via a Hyper-V Network Virtualization (HNV) logical network. This configuration forms an isolation boundary where the virtual machines within the virtual network can only communicate with each other. In this attack vector, the vulnerable component is bound to the network stack, but the attack is limited to systems configured to use the HNV network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49751
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Denial of Service 5062560
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2016 5063871 (Security Update) Important Denial of Service 5062560
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Denial of Service 5062560
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Denial of Service 5062570
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49751 HongZhenhao with TianGong Team of Legendsec at Qi'anxin Group


CVE-2025-49745 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49745
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:L), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability).


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49745
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5059086 (Security Update) Important Spoofing Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
9.1.38.10
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49745 batram


batram


CVE-2025-49758 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49758
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker with explicit permissions could exploit the vulnerability by logging in to the SQL server and could then elevate their privileges to sysadmin.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49758
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 5063762 (Security Update) Important Elevation of Privilege 5058718
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.6465.1
Maybe None
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 5063761 (Security Update) Important Elevation of Privilege 5058717
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.7060.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 5063759 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.3500.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (GDR) 5063760 (Security Update) Important Elevation of Privilege 5058716
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.2080.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 5063757 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4440.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5063758 (Security Update) Important Elevation of Privilege 5058713
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2140.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49758 Chris Thompson with SpecterOps


CVE-2025-53727 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53727
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit the vulnerability?

An attacker could inject arbitrary T-SQL commands by crafting a malicious database name.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain sysadmin privileges.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53727
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 5063762 (Security Update) Important Elevation of Privilege 5058718
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.6465.1
Maybe None
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 5063761 (Security Update) Important Elevation of Privilege 5058717
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.7060.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 5063759 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.3500.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (GDR) 5063760 (Security Update) Important Elevation of Privilege 5058716
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.2080.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 5063757 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4440.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5063758 (Security Update) Important Elevation of Privilege 5058713
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2140.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53727 Fabiano Amorim with Pythian


CVE-2025-53729 - Microsoft Azure File Sync Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53729
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53729
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure File Sync v18.0 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.0.0.0
No None
Azure File Sync v19.0 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.1.0.0
No None
Azure File Sync v20.0 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20.0.0.0
No None
Azure File Sync v21.0 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
21.2.0.0
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53729 Michal Kamensky with Microsoft


CVE-2025-33051 - Microsoft Exchange Server Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-33051
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Microsoft Exchange Server allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is whether an email address exists on the server or not.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-33051
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5063223 (Security Update) Important Information Disclosure 5049233
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.01.2507.058
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5063222 (Security Update) Important Information Disclosure 5049233
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1544.033
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5063221 (Security Update) Important Information Disclosure 5049233
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1748.036
Yes None
Microsoft Exchange Server Subscription Edition RTM 5063224 (Security Update) Important Information Disclosure Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.2562.020
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-33051 Ben Sparks


CVE-2025-53730 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53730
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to be tricked into opening a malicious file in Visio.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53730
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53730 c0d3nh4ck with Zscaler's ThreatLabz


CVE-2025-53741 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53741
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53741
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53741 boolgombear & Jmini


CVE-2025-53759 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53759
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53759
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53759 Jmini with boolgombear


Jmini with boolgombear


CVE-2025-53760 - Microsoft SharePoint Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53760
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Server-side request forgery (ssrf) in Microsoft Office SharePoint allows an authorized attacker to elevate privileges over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H), and some loss of integrity (I:L) and no loss of availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could view sensitive information, a token in this scenario (Confidentiality), and make some changes to disclosed information (Integrity), but they would not be able to affect Availability.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user.


I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running?

Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53760
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002771 (Security Update) Important Elevation of Privilege 5002760
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.5513.1002
Maybe None
Microsoft SharePoint Server 2019 5002769 (Security Update) Important Elevation of Privilege 5002754
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.10417.20041
Maybe None
Microsoft SharePoint Server Subscription Edition 5002773 (Security Update) Important Elevation of Privilege 5002768
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.18526.20518
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53760 None

CVE-2025-53761 - Microsoft PowerPoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53761
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PowerPoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53761
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft PowerPoint 2016 (32-bit edition) 5002765 (Security Update) Important Remote Code Execution 5002746
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft PowerPoint 2016 (64-bit edition) 5002765 (Security Update) Important Remote Code Execution 5002746
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53761 Anonymous


CVE-2025-24999 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24999
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker with explicit permissions could exploit the vulnerability by logging in to the SQL server and could then elevate their privileges to sysadmin.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain sysadmin privileges.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24999
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 5063762 (Security Update) Important Elevation of Privilege 5058718
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.6465.1
Maybe None
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 5063761 (Security Update) Important Elevation of Privilege 5058717
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.7060.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 5063759 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.3500.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (GDR) 5063760 (Security Update) Important Elevation of Privilege 5058716
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.2080.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 5063757 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4440.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5063758 (Security Update) Important Elevation of Privilege 5058713
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2140.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24999 Emad Al-Mousa


CVE-2025-53772 - Web Deploy Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53772
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Web Deploy Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

An authenticated attacker could exploit the vulnerability by sending a malicious http request to the web server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53772
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Web Deploy 4.0 Release Notes (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.2001
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53772 Batuhan Er with HawkTrace


CVE-2025-53773 - GitHub Copilot and Visual Studio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53773
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: GitHub Copilot and Visual Studio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of this vulnerability requires that a user trigger the payload in the application.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53773
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2022 version 17.14 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.14.12
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53773 Johann Rehberger with https://embracethered.com/


Markus Vervier with Persistent Security Industries GmbH


CVE-2025-53781 - Azure Virtual Machines Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53781
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Virtual Machines Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Azure Virtual Machines allows an authorized attacker to disclose information over a network.


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53781
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
DCadsv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCasv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCedsv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCesv5-series - Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
DCesv6-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECadsv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECasv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECedsv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
ECesv5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Ecesv6-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
NCCadsH100v5-series Azure VM Critical Information Disclosure None Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53781 Microsoft Offensive Research & Security Engineering


CVE-2025-53786 - Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53786
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the steps documented with the April 18th announcement. Microsoft strongly recommends reading the information, installing the April 2025 (or later) Hot Fix and implementing the changes in your Exchange Server and hybrid environment.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability within the organization’s cloud environment?

In an Exchange hybrid deployment, an attacker who first gains administrative access to an on-premises Exchange server could potentially escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable trace. This risk arises because Exchange Server and Exchange Online share the same service principal in hybrid configurations.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this scenario, successfully exploiting the vulnerability could enable an attacker to escalate privileges within the organization’s connected cloud environment without leaving easily detectable and auditable traces.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to first gain or possess administrator access on an Exchange Server.


Microsoft Exchange Server Subscription Edition RTM didn't exist in April when the hot fix was released. Why is it listed in the Security Updates Table?

Support for the dedicated Exchange hybrid app feature is already part of the initial release of the Exchange Server SE version. If you have already migrated to the newest version you already have this level of protection from the vulnerability. All you need to do is to follow the steps as outlined in the documentation to enable the feature and clear the certificates from the shared service principals keyCredentials.


What steps do I need to take to better protect my hybrid environment?

  1. If you're using Exchange hybrid, install the Hot Fix (or newer release) on your on-premises Exchange servers and follow the configuration instructions outlined in Deploy dedicated Exchange hybrid app. For additional details, refer to Exchange Server Security Changes for Hybrid Deployments. After completing the steps, be sure to reset the service principal's keyCredentials.

  2. If you’ve previously configured Exchange hybrid or OAuth authentication between Exchange Server and your Exchange Online organization but no longer use it, make sure to reset the service principal's keyCredentials.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53786
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5050674 (Security Update) Important Elevation of Privilege Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.01.2507.055
Maybe None
Microsoft Exchange Server 2019 Cumulative Update 14 5050673 (Security Update) Important Elevation of Privilege Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1544.025
Maybe None
Microsoft Exchange Server 2019 Cumulative Update 15 5050672 (Security Update) Important Elevation of Privilege Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1748.024
Maybe None
Microsoft Exchange Server Subscription Edition RTM 5047155 (Security Update) Important Elevation of Privilege Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.2562.017
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53786 Dirk-jan Mollema with Outsider Security


CVE-2025-8582 - Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8582
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8582
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8582 None

CVE-2025-8581 - Chromium: CVE-2025-8581 Inappropriate implementation in Extensions

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8581
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8581 Inappropriate implementation in Extensions
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8581
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8581 None

CVE-2025-8580 - Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8580
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8580
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8580 None

CVE-2025-8578 - Chromium: CVE-2025-8578 Use after free in Cast

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8578
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8578 Use after free in Cast
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8578
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8578 None

CVE-2025-8576 - Chromium: CVE-2025-8576 Use after free in Extensions

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8576
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8576 Use after free in Extensions
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8576
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8576 None

CVE-2025-25005 - Microsoft Exchange Server Tampering Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25005
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Tampering Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Microsoft Exchange Server allows an authorized attacker to perform tampering over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Tampering

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25005
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5063223 (Security Update) Important Tampering 5049233
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.01.2507.058
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5063222 (Security Update) Important Tampering 5049233
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1544.033
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5063221 (Security Update) Important Tampering 5049233
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1748.036
Yes None
Microsoft Exchange Server Subscription Edition RTM 5063224 (Security Update) Important Tampering Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.2562.020
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25005 None

CVE-2025-25006 - Microsoft Exchange Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25006
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper handling of additional special element in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

An attacker could spoof incorrect 5322.From email address that is displayed to a user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25006
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5063223 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.01.2507.058
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5063222 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.1544.033
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5063221 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.1748.036
Yes None
Microsoft Exchange Server Subscription Edition RTM 5063224 (Security Update) Important Spoofing Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.2562.020
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25006 Anna Breeva


CVE-2025-25007 - Microsoft Exchange Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25007
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

An attacker could spoof incorrect 5322.From email address that is displayed to a user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25007
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5063223 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.01.2507.058
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5063222 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.1544.033
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5063221 (Security Update) Important Spoofing 5049233
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.1748.036
Yes None
Microsoft Exchange Server Subscription Edition RTM 5063224 (Security Update) Important Spoofing Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
15.02.2562.020
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25007 None

CVE-2025-49743 - Windows Graphics Component Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49743
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with privileges could send controlled inputs to exploit this vulnerability.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49743
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49743 Anonymous


CVE-2025-49757 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49757
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49757
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5062624 (Monthly Rollup)
5062618 (Security Only)
Important Remote Code Execution 5061026
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23418
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5062624 (Monthly Rollup)
5062618 (Security Only)
Important Remote Code Execution 5061026
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23418
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5062624 (Monthly Rollup)
5062618 (Security Only)
Important Remote Code Execution 5061026
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23418
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5062624 (Monthly Rollup)
5062618 (Security Only)
Important Remote Code Execution 5061026
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23418
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5062632 (Monthly Rollup)
5062619 (Security Only)
Important Remote Code Execution 5061078
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27820
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5062632 (Monthly Rollup)
5062619 (Security Only)
Important Remote Code Execution 5061078
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27820
Yes None
Windows Server 2012 5062592 (Monthly Rollup) Important Remote Code Execution 5061059
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25573
Yes None
Windows Server 2012 (Server Core installation) 5062592 (Monthly Rollup) Important Remote Code Execution 5061059
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25573
Yes None
Windows Server 2012 R2 5062597 (Monthly Rollup) Important Remote Code Execution 5061018
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22676
Yes None
Windows Server 2012 R2 (Server Core installation) 5062597 (Monthly Rollup) Important Remote Code Execution 5061018
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22676
Yes None
Windows Server 2016 5062560 (Security Update) Important Remote Code Execution 5061010
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2016 (Server Core installation) 5062560 (Security Update) Important Remote Code Execution 5061010
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2019 5062557 (Security Update) Important Remote Code Execution 5060531
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2019 (Server Core installation) 5062557 (Security Update) Important Remote Code Execution 5060531
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2022 5062572 (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022 (Server Core installation) 5062572 (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5062570 (Security Update) Important Remote Code Execution 5060118
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1732
Yes None
Windows Server 2025 5062553 (Security Update) Important Remote Code Execution 5060842
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2025 (Server Core installation) 5062553 (Security Update) Important Remote Code Execution 5060842
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49757 Anonymous


CVE-2025-49759 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49759
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


How could an attacker exploit the vulnerability?

An attacker could inject arbitrary T-SQL commands by crafting a malicious database name.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49759
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 5063762 (Security Update) Important Elevation of Privilege 5058718
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.6465.1
Maybe None
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 5063761 (Security Update) Important Elevation of Privilege 5058717
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
13.0.7060.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 5063759 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.3500.1
Maybe None
Microsoft SQL Server 2017 for x64-based Systems (GDR) 5063760 (Security Update) Important Elevation of Privilege 5058716
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
14.0.2080.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 5063757 (Security Update) Important Elevation of Privilege 5058714
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4440.1
Maybe None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5063758 (Security Update) Important Elevation of Privilege 5058713
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2140.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49759 Anonymous


CVE-2025-49761 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49761
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49761
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49761 Anonymous


CVE-2025-49762 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49762
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49762
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49762 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-50153 - Desktop Windows Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50153
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Desktop Windows Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could an attacker gain with successful exploitation?

An attacker who successfully exploited this vulnerability could gain unauthorized access to system resources, potentially allowing them to perform actions with the same privileges as the compromised process.

This could lead to further system compromise and unauthorized actions within the network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50153
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50153 Varun Goel


CVE-2025-50154 - Microsoft Windows File Explorer Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50154
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to be tricked into opening a folder that contains a specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50154
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Spoofing 5062561
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Spoofing 5062561
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Spoofing 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Spoofing 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Spoofing 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Spoofing 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Spoofing 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Spoofing 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Spoofing 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Spoofing 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Spoofing 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Spoofing 5062624
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Spoofing 5062624
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Spoofing 5062624
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Spoofing 5062624
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Spoofing 5062632
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Spoofing 5062632
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Spoofing 5062592
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Spoofing 5062592
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Spoofing 5062597
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Spoofing 5062597
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Spoofing 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Spoofing 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Spoofing 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Spoofing 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Spoofing 5062572
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Spoofing 5062572
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Spoofing 5062570
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50154 Ruben Enkaoua with Cymulate


CVE-2025-50156 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50156
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50156
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50156 Anonymous


CVE-2025-50158 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50158
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.3
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 7.0
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50158 Anonymous


CVE-2025-50159 - Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50159
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Remote Access Point-to-Point Protocol (PPP) EAP-TLS allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

An administrative user must be convinced to open a malicious COM object like an .rtf file.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50159 Hussein Aurbyae with Microsoft


CVE-2025-50160 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50160
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50160
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50160 Anonymous


CVE-2025-50161 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50161
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with privileges could send controlled inputs to exploit this vulnerability.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50161
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50161 Arnaud Lubin


CVE-2025-50162 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50162
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50162
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50162 Anonymous


CVE-2025-50163 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50163
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50163
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50163 Anonymous


CVE-2025-50164 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50164
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50164
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50164 Anonymous


CVE-2025-50165 - Windows Graphics Component Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50165
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Graphics Component Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, attack vector is (AV:N) and user interaction is none (UI:N). What does that mean for this vulnerability?

This can happen without user intervention. An attacker can use an uninitialized function pointer being called when decoding a JPEG image. This can be embedded in Office and 3rd party documents/files


How could an attacker exploit the vulnerability?

An attacker who successfully exploits this vulnerability could achieve remote code execution without user interaction.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50165 4n0nym4u5 with Zscaler


CVE-2025-50166 - Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50166
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50166
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50166 Anonymous


CVE-2025-50167 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50167
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50167
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50167 Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative


Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative


CVE-2025-50168 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50168
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50168
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50168 Hyeonjin Choi (@d4m0n_8) of Out Of Bounds with Trend Zero Day Initiative


CVE-2025-50169 - Windows SMB Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50169
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SMB Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50169
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50169 Anonymous


CVE-2025-50170 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50170
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper handling of insufficient permissions or privileges in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50170
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50170 Chen Le Qi (@cplearns2h4ck) with STAR Labs SG Pte. Ltd.


CVE-2025-50171 - Remote Desktop Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50171
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Desktop Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Missing authorization in Remote Desktop Server allows an unauthorized attacker to perform spoofing over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50171
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Spoofing 5062572
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Spoofing 5062572
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Spoofing 5062570
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Spoofing 5062553
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50171 Philemon Orphee Favrod


Ray Reskusich with Microsoft


CVE-2025-50172 - DirectX Graphics Kernel Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50172
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Allocation of resources without limits or throttling in Windows DirectX allows an authorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50172
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Denial of Service 5062570
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50172 cyanbamboo and b2ahex


CVE-2025-50173 - Windows Installer Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50173
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Installer Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50173 JaGoTu with DCIT, a.s.


CVE-2025-50176 - DirectX Graphics Kernel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50176
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Graphics Kernel allows an authorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50176
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Critical Remote Code Execution 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50176 b2ahex


cyanbamboo


CVE-2025-50177 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50177
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker would need to send a series of specially crafted MSMQ packets in a rapid sequence over HTTP to a MSMQ server.

This could result in remote code execution on the server side.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50177
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Critical Remote Code Execution 5062561
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Critical Remote Code Execution 5062561
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Remote Code Execution 5062632
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Remote Code Execution 5062632
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Critical Remote Code Execution 5062592
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Critical Remote Code Execution 5062592
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Critical Remote Code Execution 5062597
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Critical Remote Code Execution 5062597
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Critical Remote Code Execution 5062570
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50177 Azure Yang with Kunlun Lab


CVE-2025-53131 - Windows Media Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53131
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution.


How could an attacker exploit this vulnerability?

An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53131
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53131 Kai Lu of Palo Alto Networks


CVE-2025-53132 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53132
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53132
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53132 goodbyeselene with Trend Zero Day Initiative


goodbyeselene with Trend Zero Day Initiative


Anonymous


goodbyeselene with Trend Zero Day Initiative


CVE-2025-53133 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53133
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53133
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53133 Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat


Dongjun Kim (smlijun) with Ajou University, and working at ENKI WhiteHat


Seongheun Hong (seongheunh) with Ajou University


Pwnforr777


Hwiwon Lee (hwiwonl), SEC-agent team


Taewoo (Tae_ω02)


CVE-2025-53134 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53134
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53134
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53134 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-53135 - DirectX Graphics Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53135
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53135
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53135 cyanbamboo and b2ahex


CVE-2025-53136 - NT OS Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53136
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NT OS Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53136
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Information Disclosure 5062561
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Information Disclosure 5062554
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Information Disclosure 5062552
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53136 Bùi Quang Hiếu (@tykawaii98) with Crowdfense


CVE-2025-53137 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53137
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53137
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53137 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-53138 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53138
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53138
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53138 Anonymous


CVE-2025-53140 - Windows Kernel Transaction Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53140
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Transaction Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Kernel Transaction Manager allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53140
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53140 Anonymous


CVE-2025-53141 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53141
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53141
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53141 Marat Gayanov with Positive Technologies


CVE-2025-53142 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53142
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53142
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53142 ChenJian with Sea Security Orca Team


hazard


hazard


CVE-2025-53143 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53143
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53143
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53143 k0shl with Kunlun Lab


CVE-2025-53144 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53144
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53144
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53144 k0shl with Kunlun Lab


CVE-2025-53145 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53145
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an authenticated attacker would need to send a specially crafted MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53145
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53145 k0shl with Kunlun Lab


CVE-2025-53147 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53147
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53147
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53147 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-53148 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53148
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53148
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53148 Anonymous


CVE-2025-53149 - Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53149
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53149
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53149 Aleksandr Koshelev from Crowdfense


CVE-2025-53151 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53151
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53151
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53151 hazard


CVE-2025-53152 - Desktop Windows Manager Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53152
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Desktop Windows Manager Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Desktop Windows Manager allows an authorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word "Remote" in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to create a window and intentionally cause it to hang. This could be used to exploit the GhostWindow object use-after-free (UAF) vulnerability in the DWM process on the victim's system.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to have obtained low privileged code execution on target host first.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53152
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Remote Code Execution 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Remote Code Execution 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Remote Code Execution 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53152 Varun Goel


CVE-2025-53153 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53153
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53153
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53153 Anonymous


CVE-2025-53154 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53154
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53154
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53154 dungnm with Viettel Cyber Security


CVE-2025-53155 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53155
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker could create a crafted vhdx file and can call the vhdmp api with vhdx as one of the arguments.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53155
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53155 Do Manh Dung & Nguyen Dang Nguyen of STAR Labs SG Pte. Ltd. (@starlabs_sg) working with Trend Zero Day Initiative


Do Manh Dung & Nguyen Dang Nguyen of STAR Labs SG Pte. Ltd. (@starlabs_sg) working with Trend Zero Day Initiative


CVE-2025-53156 - Windows Storage Port Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53156
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Storage Port Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain kernel memory content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53156
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53156 Anonymous


DEVCORE - Angelboy (@scwuaptx) from DEVCORE Research Team with Trend Zero Day Initiative


CVE-2025-53716 - Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53716
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53716
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Denial of Service 5062557
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Denial of Service 5062570
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53716 Anonymous


CVE-2025-53718 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53718
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53718
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Elevation of Privilege 5062624
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Elevation of Privilege 5062632
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53718 dungnm with Viettel Cyber Security


CVE-2025-53719 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53719
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53719
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53719 Anonymous


CVE-2025-53720 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53720
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR:L). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an authorized attacker on the domain to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53720
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Remote Code Execution 5062624
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Remote Code Execution 5062632
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Remote Code Execution 5062592
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Remote Code Execution 5062597
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Remote Code Execution 5062560
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Remote Code Execution 5062557
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062572
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Remote Code Execution 5062570
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Remote Code Execution 5062553
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53720 Anonymous


CVE-2025-53721 - Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53721
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53721
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53721 Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute


CVE-2025-53722 - Windows Remote Desktop Services Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53722
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53722
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Denial of Service 5062561
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Denial of Service 5062561
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Denial of Service 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Denial of Service 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Denial of Service 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Denial of Service 5062554
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Denial of Service 5062552
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Denial of Service 5062632
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Denial of Service 5062632
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Denial of Service 5062592
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Denial of Service 5062592
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Denial of Service 5062597
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Denial of Service 5062597
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Denial of Service 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Denial of Service 5062560
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Denial of Service 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Denial of Service 5062557
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Denial of Service 5062572
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Denial of Service 5062570
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Denial of Service 5062553
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53722 Erik Egsgard with Field Effect


CVE-2025-53723 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53723
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Numeric truncation error in Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53723
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53723 Chen Le Qi (@cplearns2h4ck) of STAR Labs SG Pte. Ltd. (@starlabs_sg) with Trend Zero Day Initiative


pwnky


CVE-2025-53724 - Windows Push Notifications Apps Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53724
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.

Please refer to AppContainer isolation and Mandatory Integrity Control for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53724
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53724 Anonymous


Anonymous


CVE-2025-53725 - Windows Push Notifications Apps Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53725
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.

Please refer to AppContainer isolation and Mandatory Integrity Control for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53725
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53725 Anonymous


CVE-2025-53726 - Windows Push Notifications Apps Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53726
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level.

Please refer to AppContainer isolation and Mandatory Integrity Control for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53726
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53726 anonymous


CVE-2025-53728 - Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53728
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53728
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5064483 (Security Update) Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
9.1.39
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53728 Ha Anh Hoang with Viettel Cyber Security


CVE-2025-47954 - Microsoft SQL Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-47954
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit the vulnerability?

An attacker could use the unsanitized parameter into a SQL query to trigger SQL Injection.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain sysadmin privileges.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update Number Title Version Apply if current product version is… This security update also includes servicing releases up through…
5063814 Security update for SQL Server 2022 CU19+GDR 16.0.4210.1 16.0.4003.1 - 16.0.4205.1 KB 5059390 - SQL2022 RTM CU20
5063756 Security update for SQL Server 2022 RTM+GDR 16.0.1145.1 16.0.1000.6 - 16.0.1140.6 KB 5058712 - Previous SQL2022 RTM GDR
5063757 Security update for SQL Server 2019 CU32+GDR 15.0.4440.1 15.0.4003.23 - 15.0.4435.7 KB 5058722 - Previous SQL2019 RTM CU32 GDR
5063758 Security update for SQL Server 2019 RTM+GDR 15.0.2140.1 15.0.2000.5 - 15.0.2135.5 KB 5058713 - Previous SQL2019 RTM GDR
5063759 Security update for SQL Server 2017 CU31+GDR 14.0.3500.1 14.0.3006.16 - 14.0.3495.9 KB 5058714 - Previous SQL2017 RTM CU31 GDR
5063760 Security update for SQL Server 2017 RTM+GDR 14.0.2080.1 14.0.1000.169 - 14.0.2075.8 KB 5058716 - Previous SQL2017 RTM GDR
5063761 Security update for SQL 2016 Azure Connect Feature Pack 13.0.7060.1 13.0.7000.253 - 13.0.7055.9 KB 5058717 - Previous SQL2016 Azure Connect Feature Pack GDR
5063762 Security update for SQL Server 2016 SP3 RTM+GDR 13.0.6465.1 13.0.6300.2 - 13.0.6460.7 KB 5058718 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-47954
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2022 for x64-based Systems (CU 20) 5063814 (Security Update) Important Elevation of Privilege 5059390
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4210.1
Maybe None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5063756 (Security Update) Important Elevation of Privilege 5058712
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1145.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-47954 Fabiano Amorim with Pythian


CVE-2025-53731 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53731
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53731
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002756 (Security Update) Critical Remote Code Execution 5002742
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002756 (Security Update) Critical Remote Code Execution 5002742
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53731 0x140ce[LLMole]


CVE-2025-53732 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53732
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53732
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Office for Android Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.19127.20000
Maybe None
Microsoft Office for Universal Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.14326.22618
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53732 Arnaud Lubin


CVE-2025-53733 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53733
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53733
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft SharePoint Enterprise Server 2016 5002771 (Security Update)
5002772 (Security Update)
Critical Remote Code Execution 5002760

5002759
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1002
Maybe None
Microsoft SharePoint Server 2019 5002769 (Security Update)
5002770 (Security Update)
Critical Remote Code Execution 5002754

5002753
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20041
Maybe None
Microsoft Word 2016 (32-bit edition) 5002763 (Security Update) Critical Remote Code Execution 5002745
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Word 2016 (64-bit edition) 5002763 (Security Update) Critical Remote Code Execution 5002745
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53733 cdbb6164ddfda2b210fd348442322115


CVE-2025-53734 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53734
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to be tricked into opening a malicious file in Visio.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53734
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53734 c0d3nh4ck with Zscaler's ThreatLabz


CVE-2025-53735 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53735
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53735
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53735 wh1tc & Zhiniang Peng with HUST


CVE-2025-53736 - Microsoft Word Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53736
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53736
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft SharePoint Enterprise Server 2016 5002771 (Security Update)
5002772 (Security Update)
Important Information Disclosure 5002760

5002759
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.0.5513.1002
Maybe None
Microsoft SharePoint Server 2019 5002769 (Security Update)
5002770 (Security Update)
Important Information Disclosure 5002754

5002753
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.0.10417.20041
Maybe None
Microsoft Word 2016 (32-bit edition) 5002763 (Security Update) Important Information Disclosure 5002745
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Word 2016 (64-bit edition) 5002763 (Security Update) Important Information Disclosure 5002745
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53736 wh1tc in Kunlun lab, devoke, Zhiniang Peng with HUST


wh1tc in Kunlun lab, devoke, Zhiniang Peng with HUST


CVE-2025-53737 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53737
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53737
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53737 wh1tc in Kunlun lab & devoke & Zhiniang Peng with HUST


CVE-2025-53738 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53738
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53738
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Word 2016 (32-bit edition) 5002763 (Security Update) Important Remote Code Execution 5002745
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Word 2016 (64-bit edition) 5002763 (Security Update) Important Remote Code Execution 5002745
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53738 Haifei Li with EXPMON


CVE-2025-53739 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53739
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53739
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002758 (Security Update) Important Remote Code Execution 5002749
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Office Online Server 5002752 (Security Update) Important Remote Code Execution 5002740
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20034
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53739 wh1tc in Kunlun lab, devoke & Zhiniang Peng with HUST


wh1tc in Kunlun lab, devoke & Zhiniang Peng with HUST


CVE-2025-53740 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53740
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53740
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002756 (Security Update) Critical Remote Code Execution 5002742
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002756 (Security Update) Critical Remote Code Execution 5002742
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5513.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53740 Li Shuang and willJ with Vulnerability Research Institute


CVE-2025-53765 - Azure Stack Hub Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53765
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Stack Hub Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

This vulnerability could disclose administrator account passwords in the logs.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53765
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Stack Hub Release Notes (Security Update) Important Information Disclosure Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
102.10.2.11
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53765 Anonymous


CVE-2025-53766 - GDI+ Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53766
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: GDI+ Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the privilege required is none (PR:N) and user interaction is none (UI:N). What does that mean for this vulnerability?

An attacker doesn't require any privileges on the systems hosting the web services. Successful exploitation of this vulnerability could cause Remote Code Execution or Information Disclosure on web services that are parsing documents that contain a specially crafted metafile, without the involvement of a victim user.


According to the CVSS metric, the attack vector is network (AV:N). How could an attacker exploit the vulnerability?

An attacker could trigger this vulnerability by convincing a victim to download and open a document that contains a specially crafted metafile. In the worst-case scenario, an attacker could trigger this vulnerability on web services by uploading documents containing a specially crafted metafile (AV:N) without user interaction. When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53766
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Office for Android Release Notes (Security Update) Critical Remote Code Execution Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.19127.20000
Maybe None
Microsoft Office for Universal Release Notes (Security Update) Critical Remote Code Execution Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.14326.22618
Maybe None
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Critical Remote Code Execution 5062561
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Critical Remote Code Execution 5062561
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Remote Code Execution 5062554
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Critical Remote Code Execution 5062552
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Remote Code Execution 5062624
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Remote Code Execution 5062632
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Remote Code Execution 5062632
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Critical Remote Code Execution 5062592
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Critical Remote Code Execution 5062592
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Critical Remote Code Execution 5062597
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Critical Remote Code Execution 5062597
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Critical Remote Code Execution 5062560
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Critical Remote Code Execution 5062557
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062572
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Critical Remote Code Execution 5062570
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5062553
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53766 Gábor Selján with Check Point Research


CVE-2025-53769 - Windows Security App Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53769
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Security App Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53769
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Security App (Security Update) Important Spoofing Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1000.27840.1000.0
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53769 Jimmy Bayne of IBM X-Force


CVE-2025-50157 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50157
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR:L). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an authorized attacker on the domain to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


How could an attacker exploit this vulnerability?

An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Important Information Disclosure 5062624
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Important Information Disclosure 5062632
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Information Disclosure 5062592
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Information Disclosure 5062597
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Information Disclosure 5062560
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Information Disclosure 5062557
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Information Disclosure 5062572
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Information Disclosure 5062570
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Information Disclosure 5062553
Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50157 Anonymous


CVE-2025-50155 - Windows Push Notifications Apps Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50155
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notifications Apps Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited the vulnerability could elevate from a low integrity level up to a medium integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50155
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Important Elevation of Privilege 5062561
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Important Elevation of Privilege 5062554
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Important Elevation of Privilege 5062552
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Important Elevation of Privilege 5062592
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Important Elevation of Privilege 5062597
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Important Elevation of Privilege 5062560
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Important Elevation of Privilege 5062557
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062572
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Important Elevation of Privilege 5062570
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5062553
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50155 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-53778 - Windows NTLM Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53778
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTLM Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53778
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5063889 (SecurityUpdate) Critical Elevation of Privilege 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 for x64-based Systems 5063889 (SecurityUpdate) Critical Elevation of Privilege 5062561
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21100
Yes None
Windows 10 Version 1607 for 32-bit Systems 5063871 (Security Update) Critical Elevation of Privilege 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1607 for x64-based Systems 5063871 (Security Update) Critical Elevation of Privilege 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows 10 Version 1809 for 32-bit Systems 5063877 (Security Update) Critical Elevation of Privilege 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 1809 for x64-based Systems 5063877 (Security Update) Critical Elevation of Privilege 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 21H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6216
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 10 Version 22H2 for x64-based Systems 5063709 (SecurityUpdate) Critical Elevation of Privilege 5062554
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6216
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5063875 (Security Update) Critical Elevation of Privilege 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 22H2 for x64-based Systems 5063875 (Security Update) Critical Elevation of Privilege 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5768
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5063875 (Security Update) Critical Elevation of Privilege 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 23H2 for x64-based Systems 5063875 (Security Update) Critical Elevation of Privilege 5062552
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5768
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows 11 Version 24H2 for x64-based Systems 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Elevation of Privilege 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Elevation of Privilege 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Elevation of Privilege 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5063888 (MonthlyRollup)
5063948 (SecurityOnly)
Critical Elevation of Privilege 5062624
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23471
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Elevation of Privilege 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5063947 (MonthlyRollup)
5063927 (SecurityOnly)
Critical Elevation of Privilege 5062632
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27872
Yes None
Windows Server 2012 5063906 (MonthlyRollup) Critical Elevation of Privilege 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 (Server Core installation) 5063906 (MonthlyRollup) Critical Elevation of Privilege 5062592
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25622
Yes None
Windows Server 2012 R2 5063950 (MonthlyRollup) Critical Elevation of Privilege 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2012 R2 (Server Core installation) 5063950 (MonthlyRollup) Critical Elevation of Privilege 5062597
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22725
Yes None
Windows Server 2016 5063871 (Security Update) Critical Elevation of Privilege 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2016 (Server Core installation) 5063871 (Security Update) Critical Elevation of Privilege 5062560
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8330
Yes None
Windows Server 2019 5063877 (Security Update) Critical Elevation of Privilege 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2019 (Server Core installation) 5063877 (Security Update) Critical Elevation of Privilege 5062557
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7678
Yes None
Windows Server 2022 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022 (Server Core installation) 5063880 (SecurityUpdate)
5063812 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062572
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4052

10.0.20348.3989
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5063899 (SecurityUpdate) Critical Elevation of Privilege 5062570
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1791
Yes None
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Critical Elevation of Privilege 5062553
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53778 Tianze Ding (@D1iv3)


CVE-2025-53779 - Windows Kerberos Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53779
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network.


FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

To successfully exploit this vulnerability, an attacker would need to have elevated access to certain attributes of the dMSA, specifically:

  • msds-groupMSAMembership: This attribute allows the user to utilize the dMSA.
  • msds-ManagedAccountPrecededByLink: The attacker needs write access to this attribute, which allows them to specify a user that the dMSA can act on behalf of.

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain domain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Moderate Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53779
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2025 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Moderate Elevation of Privilege 5062553
Base: 7.2
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None
Windows Server 2025 (Server Core installation) 5063878 (Security Update)
5064010 (SecurityHotpatchUpdate)
Moderate Elevation of Privilege 5062553
Base: 7.2
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.4946

10.0.26100.4851
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53779 Yuval Gordon with Akamai


CVE-2025-53783 - Microsoft Teams Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53783
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Teams Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53783
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Teams for Android Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1416/1.0.0.2025102802
Maybe None
Microsoft Teams for Desktop Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
25122.1415.3698.6812
Maybe None
Microsoft Teams for iOS Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
7.10.1 (100772025102901)
Maybe None
Microsoft Teams for Mac Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
25122.1207.3700.1444
No None
Teams for D365 Guides Hololens Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
907.2505.29001.0
Maybe None
Teams for D365 Remote Assist HoloLens Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
316.2505.28001
Maybe None
Teams Panels Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1449/1.0.97.2025102203
Maybe None
Teams Phones Release Notes (Security Update) Important Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1449/1.0.94.2025168802
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53783 Anonymous working with Trend Zero Day Initiative


CVE-2025-53784 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53784
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53784
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.100.25081015
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53784 Haifei Li with EXPMON


CVE-2025-53788 - Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53788
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53788
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Subsystem for Linux (WSL2) Release Notes (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.5.10
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53788 Nitesh Surana (niteshsurana.com) and Nelson William Gamazo Sanchez of Trend Research with Trend Micro


CVE-2025-53789 - Windows StateRepository API Server file Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53789
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows StateRepository API Server file Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Missing authentication for critical function in Windows StateRepository API allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53789
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5062561 (Security Update) Important Elevation of Privilege 5060998
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21073
Yes None
Windows 10 for x64-based Systems 5062561 (Security Update) Important Elevation of Privilege 5060998
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21073
Yes None
Windows 10 Version 1607 for 32-bit Systems 5062560 (Security Update) Important Elevation of Privilege 5061010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows 10 Version 1607 for x64-based Systems 5062560 (Security Update) Important Elevation of Privilege 5061010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows 10 Version 1809 for 32-bit Systems 5062557 (Security Update) Important Elevation of Privilege 5060531
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows 10 Version 1809 for x64-based Systems 5062557 (Security Update) Important Elevation of Privilege 5060531
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 21H2 for x64-based Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 22H2 for x64-based Systems 5062554 (Security Update) Important Elevation of Privilege 5060533
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5062552 (Security Update) Important Elevation of Privilege 5060999
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5624
Yes None
Windows 11 Version 22H2 for x64-based Systems 5062552 (Security Update) Important Elevation of Privilege 5060999
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5062552 (Security Update) Important Elevation of Privilege 5060999
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5624
Yes None
Windows 11 Version 23H2 for x64-based Systems 5062552 (Security Update) Important Elevation of Privilege 5060999
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5062553 (Security Update) Important Elevation of Privilege 5060842
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows 11 Version 24H2 for x64-based Systems 5062553 (Security Update) Important Elevation of Privilege 5060842
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2016 5062560 (Security Update) Important Elevation of Privilege 5061010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2016 (Server Core installation) 5062560 (Security Update) Important Elevation of Privilege 5061010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2019 5062557 (Security Update) Important Elevation of Privilege 5060531
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2019 (Server Core installation) 5062557 (Security Update) Important Elevation of Privilege 5060531
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2022 5062572 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022 (Server Core installation) 5062572 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5062570 (Security Update) Important Elevation of Privilege 5060118
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1732
Yes None
Windows Server 2025 5062553 (Security Update) Important Elevation of Privilege 5060842
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2025 (Server Core installation) 5062553 (Security Update) Important Elevation of Privilege 5060842
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53789 R4nger with CyberKunLun & Zhiniang Peng with HUST


CVE-2025-53793 - Azure Stack Hub Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53793
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Stack Hub Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

System internal configuration could be disclosed by this vulnerability.


What should users do to protect themselves?

Users can follow the instructions in the release notes to update the Azure Stack Hub environment to latest version 1.2501.1.47.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published.


Critical Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53793
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Stack Hub 2406 Release Notes (Security Update)
Release Notes (Security Update)
Critical Information Disclosure Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.2406.1.23
No None
Azure Stack Hub 2408 Release Notes (Security Update)
Release Notes (Security Update)
Critical Information Disclosure Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.2408.1.50
No None
Azure Stack Hub 2501 Release Notes (Security Update)
Release Notes (Security Update)
Critical Information Disclosure Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.2501.1.47
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53793 nxhoang99 with VCSLab of Viettel Cyber Security


CVE-2025-8583 - Chromium: CVE-2025-8583 Inappropriate implementation in Permissions

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8583
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8583 Inappropriate implementation in Permissions
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8583
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8583 None

CVE-2025-8579 - Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8579
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8579
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8579 None

CVE-2025-8577 - Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8577
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture
CVSS:
None
Executive Summary:

Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
139.0.3405.86 8/07/2025 139.0.7258.66/67

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8577
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
139.0.3405.86
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8577 None

CVE-2025-48807 - Windows Hyper-V Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-48807
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

A race condition is triggered when the admin begins administering from the host system and not a guest or nested guest.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

At the time the authorized attacker sends a specially crafted request an administrator needs to take action on the host.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An attacker on a nested guest VM who successfully exploited the vulnerability could escape their VM and gain admin privilege on the guest that is serving as the host.

For diagrams and more detailed information about nested VMs please see Run Hyper-V in a Virtual Machine with Nested Virtualization.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Aug-25    

Information published. This CVE was addressed by updates that were released in July 2025, but the CVE was inadvertently omitted from the July 2025 Security Updates. This is an informational change only. Customers who have already installed the July 2025 updates do not need to take any further action.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-48807
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for x64-based Systems 5062560 (Security Update) Critical Remote Code Execution 5061010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows 10 Version 1809 for x64-based Systems 5062557 (Security Update) Critical Remote Code Execution 5060531
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows 10 Version 21H2 for x64-based Systems 5062554 (Security Update) Critical Remote Code Execution 5060533
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 10 Version 22H2 for x64-based Systems 5062554 (Security Update) Critical Remote Code Execution 5060533
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6093
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5062552 (Security Update) Critical Remote Code Execution 5060999
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 22H2 for x64-based Systems 5062552 (Security Update) Critical Remote Code Execution 5060999
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5062552 (Security Update) Critical Remote Code Execution 5060999
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 23H2 for x64-based Systems 5062552 (Security Update) Critical Remote Code Execution 5060999
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5624
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5062553 (Security Update) Critical Remote Code Execution 5060842
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows 11 Version 24H2 for x64-based Systems 5062553 (Security Update) Critical Remote Code Execution 5060842
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2016 5062560 (Security Update) Critical Remote Code Execution 5061010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2016 (Server Core installation) 5062560 (Security Update) Critical Remote Code Execution 5061010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8246
Yes None
Windows Server 2019 5062557 (Security Update) Critical Remote Code Execution 5060531
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2019 (Server Core installation) 5062557 (Security Update) Critical Remote Code Execution 5060531
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7558
Yes None
Windows Server 2022 5062572 (Security Update) Critical Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022 (Server Core installation) 5062572 (Security Update) Critical Remote Code Execution Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3932
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5062570 (Security Update) Critical Remote Code Execution 5060118
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1732
Yes None
Windows Server 2025 5062553 (Security Update) Critical Remote Code Execution 5060842
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None
Windows Server 2025 (Server Core installation) 5062553 (Security Update) Critical Remote Code Execution 5060842
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.4652
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-48807

QWangWang & zcgonvh


CVE-2025-53792 - Azure Portal Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53792
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Portal Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53792
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Portal Critical Elevation of Privilege None Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53792 nxhoang99 with VCSLab of Viettel Cyber Security


CVE-2025-53767 - Azure OpenAI Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53767
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure OpenAI Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:10.0/TemporalScore:8.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
N/A No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53767
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Open AI Critical Elevation of Privilege None Base: 10.0
Temporal: 8.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53767 Daniel Santos with Microsoft


CVE-2025-53774 - Microsoft 365 Copilot BizChat Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53774
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics