Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, execute arbitrary code, cause denial of service, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Secure Channel can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Lightweight Directory Access Protocol (LDAP) Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in NTFS can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Telephony Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Defender Application Control can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Bluetooth Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Admin Center in Azure Portal can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Shell can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Local Session Manager (LSM) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Mobile Broadband Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Digital Media can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft Streaming Service can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- A denial of service vulnerability in HTTP.sys can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Power Dependency Coordinator can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Virtual Hard Disk can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Active Directory Domain Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Update Stack can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Hello can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Windows Kerberos can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Security Zone Mapping can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Process Activation can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows USB Print Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft DWM Core Library can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Subsystem for Linux can be exploited remotely to gain privileges.
- A denial of service vulnerability in Kerberos Key Distribution Proxy Service can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Virtualization-Based Security (VBS) can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in NTFS can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Universal Plug and Play (UPnP) Device Host can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows upnphost.dll can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in RPC Endpoint Mapper Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft OpenSSH for Windows can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Mark of the Web can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows NTFS can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Hello can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Active Directory Certificate Services can be exploited remotely to gain privileges.
Original advisories
- CVE-2025-26637
- CVE-2025-26670
- CVE-2025-27733
- CVE-2025-21205
- CVE-2025-26663
- CVE-2025-29812
- CVE-2025-27732
- CVE-2025-26678
- CVE-2025-27490
- CVE-2025-26674
- CVE-2025-26687
- CVE-2025-27469
- CVE-2025-26666
- CVE-2025-26672
- CVE-2025-29819
- CVE-2025-27482
- CVE-2025-27485
- CVE-2025-26667
- CVE-2025-27729
- CVE-2025-27738
- CVE-2025-26652
- CVE-2025-26651
- CVE-2025-27739
- CVE-2025-27727
- CVE-2025-26673
- CVE-2025-29811
- CVE-2025-21221
- CVE-2025-27476
- CVE-2025-26669
- CVE-2025-26680
- CVE-2025-27471
- CVE-2025-26641
- CVE-2025-27491
- CVE-2025-26647
- CVE-2025-27473
- CVE-2025-27492
- CVE-2025-27736
- CVE-2025-27474
- CVE-2025-26688
- CVE-2025-27728
- CVE-2025-26648
- CVE-2025-26676
- CVE-2025-27481
- CVE-2025-21222
- CVE-2025-27487
- CVE-2025-29810
- CVE-2025-26681
- CVE-2025-27475
- CVE-2025-26644
- CVE-2025-26640
- CVE-2025-29809
- CVE-2025-27478
- CVE-2025-27737
- CVE-2025-21204
- CVE-2025-27483
- CVE-2025-26639
- CVE-2025-26686
- CVE-2025-27477
- CVE-2025-24060
- CVE-2025-26675
- CVE-2025-27479
- CVE-2025-26668
- CVE-2025-21203
- CVE-2025-27480
- CVE-2025-21174
- CVE-2025-21191
- CVE-2025-29808
- CVE-2025-27730
- CVE-2025-27735
- CVE-2025-24074
- CVE-2025-27470
- CVE-2025-27742
- CVE-2025-27741
- CVE-2025-27484
- CVE-2025-27486
- CVE-2025-26665
- CVE-2025-24073
- CVE-2025-24058
- CVE-2025-29824
- CVE-2025-26679
- CVE-2025-27731
- CVE-2025-27472
- CVE-2025-21197
- CVE-2025-26635
- CVE-2025-26671
- CVE-2025-24062
- CVE-2025-26664
- CVE-2025-27467
- CVE-2025-27740
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Remote-Desktop
- Microsoft-Windows-Server-2022
CVE list
- CVE-2025-21174 critical
- CVE-2025-21191 high
- CVE-2025-21197 high
- CVE-2025-21203 high
- CVE-2025-21204 critical
- CVE-2025-21205 critical
- CVE-2025-21221 critical
- CVE-2025-21222 critical
- CVE-2025-24058 critical
- CVE-2025-24060 critical
- CVE-2025-24062 critical
- CVE-2025-24073 critical
- CVE-2025-24074 critical
- CVE-2025-26635 high
- CVE-2025-26637 high
- CVE-2025-26639 critical
- CVE-2025-26640 high
- CVE-2025-26641 critical
- CVE-2025-26644 high
- CVE-2025-26647 critical
- CVE-2025-26648 critical
- CVE-2025-26649 high
- CVE-2025-26651 high
- CVE-2025-26652 critical
- CVE-2025-26663 critical
- CVE-2025-26664 high
- CVE-2025-26665 high
- CVE-2025-26666 critical
- CVE-2025-26667 high
- CVE-2025-26668 critical
- CVE-2025-26669 critical
- CVE-2025-26670 critical
- CVE-2025-26671 critical
- CVE-2025-26672 high
- CVE-2025-26673 critical
- CVE-2025-26674 critical
- CVE-2025-26675 critical
- CVE-2025-26676 high
- CVE-2025-26678 critical
- CVE-2025-26679 critical
- CVE-2025-26680 critical
- CVE-2025-26681 high
- CVE-2025-26686 critical
- CVE-2025-26687 critical
- CVE-2025-26688 critical
- CVE-2025-27467 critical
- CVE-2025-27469 critical
- CVE-2025-27470 critical
- CVE-2025-27471 high
- CVE-2025-27472 high
- CVE-2025-27473 critical
- CVE-2025-27474 high
- CVE-2025-27475 high
- CVE-2025-27476 critical
- CVE-2025-27477 critical
- CVE-2025-27478 high
- CVE-2025-27479 critical
- CVE-2025-27480 critical
- CVE-2025-27481 critical
- CVE-2025-27482 critical
- CVE-2025-27483 critical
- CVE-2025-27484 critical
- CVE-2025-27485 critical
- CVE-2025-27486 critical
- CVE-2025-27487 critical
- CVE-2025-27490 critical
- CVE-2025-27491 high
- CVE-2025-27492 high
- CVE-2025-27727 critical
- CVE-2025-27728 critical
- CVE-2025-27729 critical
- CVE-2025-27730 critical
- CVE-2025-27731 critical
- CVE-2025-27732 high
- CVE-2025-27733 critical
- CVE-2025-27735 high
- CVE-2025-27736 high
- CVE-2025-27737 critical
- CVE-2025-27738 high
- CVE-2025-27739 critical
- CVE-2025-27740 critical
- CVE-2025-27741 critical
- CVE-2025-27742 high
- CVE-2025-29808 high
- CVE-2025-29809 high
- CVE-2025-29810 critical
- CVE-2025-29811 critical
- CVE-2025-29812 critical
- CVE-2025-29819 high
- CVE-2025-29824 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!