Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, bypass security restrictions, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Active Directory Domain Services can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Lightweight Directory Access Protocol (LDAP) Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in NTFS can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Telephony Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Security Zone Mapping can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Process Activation can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Kerberos Key Distribution Proxy Service can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in NTFS can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Universal Plug and Play (UPnP) Device Host can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft Streaming Service can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Active Directory Certificate Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows upnphost.dll can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in RPC Endpoint Mapper Service can be exploited remotely to gain privileges.
- A denial of service vulnerability in HTTP.sys can be exploited remotely to cause denial of service.
- A security feature bypass vulnerability in Windows Mark of the Web can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows NTFS can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Virtual Hard Disk can be exploited remotely to gain privileges.
Original advisories
- CVE-2025-29810
- CVE-2025-26637
- CVE-2025-26670
- CVE-2025-27733
- CVE-2025-21205
- CVE-2025-26663
- CVE-2025-27478
- CVE-2025-27737
- CVE-2025-27732
- CVE-2025-21204
- CVE-2025-26687
- CVE-2025-27483
- CVE-2025-27469
- CVE-2025-26672
- CVE-2025-26686
- CVE-2025-27477
- CVE-2025-27485
- CVE-2025-27738
- CVE-2025-26667
- CVE-2025-26652
- CVE-2025-27479
- CVE-2025-26668
- CVE-2025-27727
- CVE-2025-26673
- CVE-2025-21203
- CVE-2025-27480
- CVE-2025-21174
- CVE-2025-21191
- CVE-2025-21221
- CVE-2025-26669
- CVE-2025-26680
- CVE-2025-27470
- CVE-2025-27742
- CVE-2025-27484
- CVE-2025-27741
- CVE-2025-27486
- CVE-2025-27471
- CVE-2025-26641
- CVE-2025-27740
- CVE-2025-26647
- CVE-2025-26665
- CVE-2025-29824
- CVE-2025-26679
- CVE-2025-27473
- CVE-2025-27472
- CVE-2025-27474
- CVE-2025-21197
- CVE-2025-26671
- CVE-2025-26664
- CVE-2025-26648
- CVE-2025-26676
- CVE-2025-27481
- CVE-2025-26688
- CVE-2025-21222
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-Server-2008
CVE list
- CVE-2025-21174 critical
- CVE-2025-21191 high
- CVE-2025-21197 high
- CVE-2025-21203 high
- CVE-2025-21204 critical
- CVE-2025-21205 critical
- CVE-2025-21221 critical
- CVE-2025-21222 critical
- CVE-2025-26637 high
- CVE-2025-26641 critical
- CVE-2025-26647 critical
- CVE-2025-26648 critical
- CVE-2025-26652 critical
- CVE-2025-26663 critical
- CVE-2025-26664 high
- CVE-2025-26665 high
- CVE-2025-26667 high
- CVE-2025-26668 critical
- CVE-2025-26669 critical
- CVE-2025-26670 critical
- CVE-2025-26671 critical
- CVE-2025-26672 high
- CVE-2025-26673 critical
- CVE-2025-26676 high
- CVE-2025-26679 critical
- CVE-2025-26680 critical
- CVE-2025-26686 critical
- CVE-2025-26687 critical
- CVE-2025-26688 critical
- CVE-2025-27469 critical
- CVE-2025-27470 critical
- CVE-2025-27471 high
- CVE-2025-27472 high
- CVE-2025-27473 critical
- CVE-2025-27474 high
- CVE-2025-27477 critical
- CVE-2025-27478 high
- CVE-2025-27479 critical
- CVE-2025-27480 critical
- CVE-2025-27481 critical
- CVE-2025-27483 critical
- CVE-2025-27484 critical
- CVE-2025-27485 critical
- CVE-2025-27486 critical
- CVE-2025-27487 critical
- CVE-2025-27727 critical
- CVE-2025-27732 high
- CVE-2025-27733 critical
- CVE-2025-27737 critical
- CVE-2025-27738 high
- CVE-2025-27740 critical
- CVE-2025-27741 critical
- CVE-2025-27742 high
- CVE-2025-29810 critical
- CVE-2025-29824 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!