Kaspersky ID:
KLA90057
検出日:
11/11/2025
更新日:
02/16/2026

説明

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, read local files, cause denial of service, obtain sensitive information, bypass security restrictions, execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Smart Card Reader can be exploited remotely to gain privileges.
  2. An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
  3. A denial of service vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to cause denial of service.
  4. An elevation of privilege vulnerability in Customer Experience Improvement Program (CEIP) can be exploited remotely to gain privileges.
  5. An information disclosure vulnerability in Windows Bluetooth RFCOM Protocol Driver can be exploited remotely to obtain sensitive information.
  6. An elevation of privilege vulnerability in Microsoft Streaming Service Proxy can be exploited remotely to gain privileges.
  7. An elevation of privilege vulnerability in Windows Remote Desktop Services can be exploited remotely to gain privileges.
  8. An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Windows Client-Side Caching can be exploited remotely to gain privileges.
  10. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  11. A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
  12. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
  14. An elevation of privilege vulnerability in Windows Transport Driver Interface (TDI) Translation Driver can be exploited remotely to gain privileges.
  15. A remote code execution vulnerability in GDI+ can be exploited remotely to execute arbitrary code.
  16. A denial of service vulnerability in Storvsp.sys Driver can be exploited remotely to cause denial of service.
  17. An elevation of privilege vulnerability in Windows Speech Recognition can be exploited remotely to gain privileges.
  18. An elevation of privilege vulnerability in Windows Speech Runtime can be exploited remotely to gain privileges.
  19. An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
  20. An elevation of privilege vulnerability in Microsoft Wireless Provisioning System can be exploited remotely to gain privileges.
  21. An information disclosure vulnerability in Windows License Manager can be exploited remotely to obtain sensitive information.
  22. An elevation of privilege vulnerability in Multimedia Class Scheduler Service (MMCSS) Driver can be exploited remotely to gain privileges.
  23. An information disclosure vulnerability in Windows Speech Recognition can be exploited remotely to obtain sensitive information.
  24. A denial of service vulnerability in DirectX Graphics Kernel can be exploited remotely to cause denial of service.
  25. An elevation of privilege vulnerability in Windows Broadcast DVR User Service can be exploited remotely to gain privileges.
  26. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  27. An elevation of privilege vulnerability in Windows WLAN Service can be exploited remotely to gain privileges.

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

関連製品

CVEリスト

  • CVE-2025-59505
    critical
  • CVE-2025-59506
    high
  • CVE-2025-59507
    high
  • CVE-2025-59508
    high
  • CVE-2025-59509
    high
  • CVE-2025-59510
    high
  • CVE-2025-59511
    critical
  • CVE-2025-59512
    critical
  • CVE-2025-59513
    high
  • CVE-2025-59514
    critical
  • CVE-2025-59515
    high
  • CVE-2025-60703
    critical
  • CVE-2025-60704
    critical
  • CVE-2025-60705
    critical
  • CVE-2025-60706
    high
  • CVE-2025-60707
    critical
  • CVE-2025-60708
    high
  • CVE-2025-60709
    critical
  • CVE-2025-60714
    critical
  • CVE-2025-60715
    critical
  • CVE-2025-60716
    high
  • CVE-2025-60717
    high
  • CVE-2025-60719
    high
  • CVE-2025-60720
    critical
  • CVE-2025-60723
    high
  • CVE-2025-60724
    critical
  • CVE-2025-62208
    high
  • CVE-2025-62209
    high
  • CVE-2025-62213
    high
  • CVE-2025-62215
    high
  • CVE-2025-62217
    high
  • CVE-2025-62218
    high
  • CVE-2025-62219
    high
  • CVE-2025-62452
    critical

KBリスト

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.