Kaspersky ID:
KLA81545
Дата обнаружения:
11/03/2025
Обновлено:
13/03/2025

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, gain privileges, obtain sensitive information, cause denial of service, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Relative path traversal in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
  2. Heap-based buffer overflow in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.
  3. Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.
  4. Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
  5. Improper link resolution before file access (‘link following’) in Microsoft Windows allows an authorized attacker to elevate privileges locally.
  6. Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to disclose information with a physical attack.
  7. Heap-based buffer overflow in Windows Telephony Server allows an unauthorized attacker to execute code over a network.
  8. Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.
  9. External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
  10. Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally.
  11. Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
  12. Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
  13. Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
  14. Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
  15. Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.
  16. Security vulnerability in composition area can be exploited to bypass security restrictions.
  17. An elevation of privilege vulnerability can be exploited remotely to gain privileges.
  18. Heap-based buffer overflow in Role: Windows Hyper-V allows an authorized attacker to elevate privileges locally.
  19. Out-of-bounds read in Windows USB Video Driver allows an authorized attacker to elevate privileges with a physical attack.
  20. Use after free vulnerability in media can be exploited to cause denial of service or execute arbitrary code.
  21. Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature locally.
  22. Incorrect conversion between numeric types in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
  23. Use after free in DNS Server allows an unauthorized attacker to execute code over a network.
  24. Buffer over-read in Windows NTFS allows an unauthorized attacker to disclose information locally.
  25. Use after free in Microsoft Local Security Authority Server (lsasrv) allows an authorized attacker to elevate privileges locally.
  26. Heap-based buffer overflow in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
  27. Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.
  28. Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.
  29. Use after free in Microsoft Streaming Service allows an authorized attacker to elevate privileges locally.
  30. Integer overflow or wraparound in Windows Fast FAT Driver allows an unauthorized attacker to execute code locally.
  31. Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.
  32. Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2024-9157
    unknown
  • CVE-2025-21180
    high
  • CVE-2025-21247
    warning
  • CVE-2025-24035
    high
  • CVE-2025-24044
    high
  • CVE-2025-24045
    high
  • CVE-2025-24046
    high
  • CVE-2025-24048
    high
  • CVE-2025-24050
    high
  • CVE-2025-24051
    high
  • CVE-2025-24054
    high
  • CVE-2025-24055
    warning
  • CVE-2025-24056
    high
  • CVE-2025-24059
    high
  • CVE-2025-24061
    high
  • CVE-2025-24064
    high
  • CVE-2025-24066
    high
  • CVE-2025-24067
    high
  • CVE-2025-24071
    high
  • CVE-2025-24072
    high
  • CVE-2025-24076
    high
  • CVE-2025-24084
    high
  • CVE-2025-24983
    high
  • CVE-2025-24984
    warning
  • CVE-2025-24985
    high
  • CVE-2025-24987
    high
  • CVE-2025-24988
    high
  • CVE-2025-24991
    high
  • CVE-2025-24992
    high
  • CVE-2025-24993
    high
  • CVE-2025-24994
    high
  • CVE-2025-24995
    high
  • CVE-2025-24996
    high
  • CVE-2025-24997
    warning
  • CVE-2025-25008
    high
  • CVE-2025-26633
    high
  • CVE-2025-26634
    unknown
  • CVE-2025-26645
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.