Kaspersky ID:
KLA90811
Date de la détection:
12/09/2025
Mis à jour:
02/23/2026

Description

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, bypass security restrictions, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in PowerShell can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to gain privileges.
  3. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  4. An elevation of privilege vulnerability in Windows Client-Side Caching can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
  7. An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
  8. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  9. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  10. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Microsoft Exchange Server can be exploited remotely to gain privileges.
  12. A spoofing vulnerability in Microsoft Exchange Server can be exploited remotely to spoof user interface.
  13. An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
  14. An elevation of privilege vulnerability in Windows Projected File System can be exploited remotely to gain privileges.
  15. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  16. An elevation of privilege vulnerability in Windows File Explorer can be exploited remotely to gain privileges.
  17. An elevation of privilege vulnerability in Windows Storage VSP Driver can be exploited remotely to gain privileges.
  18. An elevation of privilege vulnerability in Windows Shell can be exploited remotely to gain privileges.
  19. An information disclosure vulnerability in Windows DirectX can be exploited remotely to obtain sensitive information.
  20. A denial of service vulnerability in DirectX Graphics Kernel can be exploited remotely to cause denial of service.
  21. An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Produits associés

Liste CVE

  • CVE-2025-54100
    critical
  • CVE-2025-55233
    critical
  • CVE-2025-59516
    critical
  • CVE-2025-59517
    critical
  • CVE-2025-62221
    critical
  • CVE-2025-62454
    critical
  • CVE-2025-62455
    critical
  • CVE-2025-62457
    critical
  • CVE-2025-62458
    critical
  • CVE-2025-62461
    critical
  • CVE-2025-62462
    critical
  • CVE-2025-62463
    high
  • CVE-2025-62464
    critical
  • CVE-2025-62466
    critical
  • CVE-2025-62467
    critical
  • CVE-2025-62470
    critical
  • CVE-2025-62472
    critical
  • CVE-2025-62473
    high
  • CVE-2025-62474
    critical
  • CVE-2025-62549
    critical
  • CVE-2025-62565
    high
  • CVE-2025-62567
    high
  • CVE-2025-62571
    critical
  • CVE-2025-62573
    high
  • CVE-2025-64658
    critical
  • CVE-2025-64661
    critical
  • CVE-2025-64666
    critical
  • CVE-2025-64667
    high
  • CVE-2025-64670
    high
  • CVE-2025-64673
    critical
  • CVE-2025-64678
    critical
  • CVE-2025-64679
    critical
  • CVE-2025-64680
    critical

Liste KB

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.