Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, execute arbitrary code, cause denial of service, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Secure Channel can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Lightweight Directory Access Protocol (LDAP) Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in NTFS can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Telephony Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Defender Application Control can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Bluetooth Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Admin Center in Azure Portal can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Shell can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Local Session Manager (LSM) can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Mobile Broadband Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Digital Media can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft Streaming Service can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Kerberos can be exploited remotely to gain privileges.
- A denial of service vulnerability in HTTP.sys can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Power Dependency Coordinator can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Virtual Hard Disk can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Active Directory Domain Services can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Update Stack can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Hello can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Windows Kerberos can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Local Security Authority (LSA) can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Security Zone Mapping can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Process Activation can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows USB Print Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft DWM Core Library can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Subsystem for Linux can be exploited remotely to gain privileges.
- A denial of service vulnerability in Kerberos Key Distribution Proxy Service can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Virtualization-Based Security (VBS) can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in NTFS can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Universal Plug and Play (UPnP) Device Host can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows upnphost.dll can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in RPC Endpoint Mapper Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft OpenSSH for Windows can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Windows Mark of the Web can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows NTFS can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Hello can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Active Directory Certificate Services can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2025-26649
CVE-2025-26637
CVE-2025-26670
CVE-2025-27733
CVE-2025-21205
CVE-2025-26663
CVE-2025-29812
CVE-2025-27732
CVE-2025-26678
CVE-2025-27490
CVE-2025-26674
CVE-2025-26687
CVE-2025-27469
CVE-2025-26666
CVE-2025-26672
CVE-2025-29819
CVE-2025-27482
CVE-2025-27485
CVE-2025-26667
CVE-2025-27729
CVE-2025-27738
CVE-2025-26652
CVE-2025-26651
CVE-2025-27739
CVE-2025-27727
CVE-2025-26673
CVE-2025-29811
CVE-2025-21221
CVE-2025-27476
CVE-2025-26669
CVE-2025-26680
CVE-2025-27471
CVE-2025-26641
CVE-2025-27491
CVE-2025-26647
CVE-2025-27473
CVE-2025-27492
CVE-2025-27736
CVE-2025-27474
CVE-2025-26688
CVE-2025-27728
CVE-2025-26648
CVE-2025-26676
CVE-2025-27481
CVE-2025-21222
CVE-2025-27487
CVE-2025-29810
CVE-2025-26681
CVE-2025-27475
CVE-2025-26644
CVE-2025-26640
CVE-2025-29809
CVE-2025-27478
CVE-2025-27737
CVE-2025-21204
CVE-2025-27483
CVE-2025-26639
CVE-2025-26686
CVE-2025-27477
CVE-2025-24060
CVE-2025-26675
CVE-2025-27479
CVE-2025-26668
CVE-2025-21203
CVE-2025-27480
CVE-2025-21174
CVE-2025-21191
CVE-2025-29808
CVE-2025-27730
CVE-2025-27735
CVE-2025-24074
CVE-2025-27470
CVE-2025-27742
CVE-2025-27741
CVE-2025-27484
CVE-2025-27486
CVE-2025-26665
CVE-2025-24073
CVE-2025-24058
CVE-2025-29824
CVE-2025-26679
CVE-2025-27731
CVE-2025-27472
CVE-2025-21197
CVE-2025-26635
CVE-2025-26671
CVE-2025-24062
CVE-2025-26664
CVE-2025-27467
CVE-2025-27740
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Remote-Desktop
- Microsoft-Windows-Server-2022
Список CVE
- CVE-2025-21174 critical
- CVE-2025-21191 high
- CVE-2025-21197 high
- CVE-2025-21203 high
- CVE-2025-21204 critical
- CVE-2025-21205 critical
- CVE-2025-21221 critical
- CVE-2025-21222 critical
- CVE-2025-24058 critical
- CVE-2025-24060 critical
- CVE-2025-24062 critical
- CVE-2025-24073 critical
- CVE-2025-24074 critical
- CVE-2025-26635 high
- CVE-2025-26637 high
- CVE-2025-26639 critical
- CVE-2025-26640 high
- CVE-2025-26641 critical
- CVE-2025-26644 high
- CVE-2025-26647 critical
- CVE-2025-26648 critical
- CVE-2025-26649 high
- CVE-2025-26651 high
- CVE-2025-26652 critical
- CVE-2025-26663 critical
- CVE-2025-26664 high
- CVE-2025-26665 high
- CVE-2025-26666 critical
- CVE-2025-26667 high
- CVE-2025-26668 critical
- CVE-2025-26669 critical
- CVE-2025-26670 critical
- CVE-2025-26671 critical
- CVE-2025-26672 high
- CVE-2025-26673 critical
- CVE-2025-26674 critical
- CVE-2025-26675 critical
- CVE-2025-26676 high
- CVE-2025-26678 critical
- CVE-2025-26679 critical
- CVE-2025-26680 critical
- CVE-2025-26681 high
- CVE-2025-26686 critical
- CVE-2025-26687 critical
- CVE-2025-26688 critical
- CVE-2025-27467 critical
- CVE-2025-27469 critical
- CVE-2025-27470 critical
- CVE-2025-27471 high
- CVE-2025-27472 high
- CVE-2025-27473 critical
- CVE-2025-27474 high
- CVE-2025-27475 high
- CVE-2025-27476 critical
- CVE-2025-27477 critical
- CVE-2025-27478 high
- CVE-2025-27479 critical
- CVE-2025-27480 critical
- CVE-2025-27481 critical
- CVE-2025-27482 critical
- CVE-2025-27483 critical
- CVE-2025-27484 critical
- CVE-2025-27485 critical
- CVE-2025-27486 critical
- CVE-2025-27487 critical
- CVE-2025-27490 critical
- CVE-2025-27491 high
- CVE-2025-27492 high
- CVE-2025-27727 critical
- CVE-2025-27728 critical
- CVE-2025-27729 critical
- CVE-2025-27730 critical
- CVE-2025-27731 critical
- CVE-2025-27732 high
- CVE-2025-27733 critical
- CVE-2025-27735 high
- CVE-2025-27736 high
- CVE-2025-27737 critical
- CVE-2025-27738 high
- CVE-2025-27739 critical
- CVE-2025-27740 critical
- CVE-2025-27741 critical
- CVE-2025-27742 high
- CVE-2025-29808 high
- CVE-2025-29809 high
- CVE-2025-29810 critical
- CVE-2025-29811 critical
- CVE-2025-29812 critical
- CVE-2025-29819 high
- CVE-2025-29824 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!