Kaspersky ID:
KLA85525
Дата обнаружения:
08/07/2025
Обновлено:
09/07/2025

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information, spoof user interface, cause denial of service.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Windows Hyper-V Discrete Device Assignment (DDA) can be exploited remotely to execute arbitrary code.
  3. A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
  4. An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
  5. An information disclosure vulnerability in Windows Imaging Component can be exploited remotely to obtain sensitive information.
  6. An elevation of privilege vulnerability in Windows Universal Plug and Play (UPnP) Device Host can be exploited remotely to gain privileges.
  7. An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
  9. A security feature bypass vulnerability in Windows SmartScreen can be exploited remotely to bypass security restrictions.
  10. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Workspace Broker can be exploited remotely to gain privileges.
  12. An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
  13. A remote code execution vulnerability in Windows KDC Proxy Service (KPSSVC) can be exploited remotely to execute arbitrary code.
  14. An elevation of privilege vulnerability in Windows Media can be exploited remotely to gain privileges.
  15. A tampering vulnerability in Windows StateRepository API Server file can be exploited remotely to spoof user interface.
  16. An elevation of privilege vulnerability in NTFS can be exploited remotely to gain privileges.
  17. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  18. An elevation of privilege vulnerability in Windows Transport Driver Interface (TDI) Translation Driver can be exploited remotely to gain privileges.
  19. An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
  20. An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) can be exploited remotely to gain privileges.
  21. An information disclosure vulnerability in Windows Secure Kernel Mode can be exploited remotely to obtain sensitive information.
  22. An elevation of privilege vulnerability in Windows Shell can be exploited remotely to gain privileges.
  23. An elevation of privilege vulnerability in Capability Access Management Service (camsvc) can be exploited remotely to gain privileges.
  24. An elevation of privilege vulnerability in Windows Input Method Editor (IME) can be exploited remotely to gain privileges.
  25. Denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  26. An elevation of privilege vulnerability in Microsoft PC Manager can be exploited remotely to gain privileges.
  27. An information disclosure vulnerability in Windows Transport Driver Interface (TDI) Translation Driver can be exploited remotely to obtain sensitive information.
  28. An elevation of privilege vulnerability in Windows Notification can be exploited remotely to gain privileges.
  29. An information disclosure vulnerability in Windows User-Mode Driver Framework Host can be exploited remotely to obtain sensitive information.
  30. A remote code execution vulnerability in Microsoft Virtual Hard Disk can be exploited remotely to execute arbitrary code.
  31. An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
  32. An elevation of privilege vulnerability in Windows TCP/IP Driver can be exploited remotely to gain privileges.
  33. Denial of service vulnerability in Windows Netlogon can be exploited remotely to cause denial of service.
  34. An elevation of privilege vulnerability in Windows AppX Deployment Service can be exploited remotely to gain privileges.
  35. A remote code execution vulnerability in Windows Miracast Wireless Display can be exploited remotely to execute arbitrary code.
  36. An information disclosure vulnerability in Windows GDI can be exploited remotely to obtain sensitive information.
  37. A remote code execution vulnerability in Windows Server Setup and Boot Event Collection can be exploited remotely to execute arbitrary code.
  38. An elevation of privilege vulnerability in Windows Simple Search and Discovery Protocol (SSDP) Service can be exploited remotely to gain privileges.
  39. An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
  40. A spoofing vulnerability in Windows Storage can be exploited remotely to spoof user interface.
  41. An elevation of privilege vulnerability in Microsoft Windows QoS Scheduler Driver can be exploited remotely to gain privileges.
  42. A denial of service vulnerability in Windows Kerberos can be exploited remotely to cause denial of service.
  43. An elevation of privilege vulnerability in Windows Fast FAT File System Driver can be exploited remotely to gain privileges.
  44. An elevation of privilege vulnerability in Credential Security Support Provider Protocol (CredSSP) can be exploited remotely to gain privileges.
  45. An elevation of privilege vulnerability in Kernel Streaming WOW Thunk Service Driver can be exploited remotely to gain privileges.
  46. A spoofing vulnerability in Windows SMB Server can be exploited remotely to spoof user interface.
  47. An elevation of privilege vulnerability in Windows Event Tracing can be exploited remotely to gain privileges.
  48. An elevation of privilege vulnerability in Microsoft Virtual Hard Disk can be exploited remotely to gain privileges.
  49. A remote code execution vulnerability in Microsoft MPEG-2 Video Extension can be exploited remotely to execute arbitrary code.
  50. A security feature bypass vulnerability in Remote Desktop Licensing Service can be exploited remotely to bypass security restrictions.
  51. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  52. A remote code execution vulnerability in Windows Connected Devices Platform Service can be exploited remotely to execute arbitrary code.
  53. An elevation of privilege vulnerability in Windows Update Service can be exploited remotely to gain privileges.
  54. An elevation of privilege vulnerability in HID Class Driver can be exploited remotely to gain privileges.
  55. An elevation of privilege vulnerability in Windows Search Service can be exploited remotely to gain privileges.
  56. A spoofing vulnerability in Remote Desktop can be exploited remotely to spoof user interface.
  57. Denial of service vulnerability in Windows Performance Recorder (WPR) can be exploited remotely to cause denial of service.
  58. An elevation of privilege vulnerability in Universal Print Management Service can be exploited remotely to gain privileges.
  59. An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
  60. Denial of service vulnerability in Windows Print Spooler can be exploited remotely to cause denial of service.
  61. An elevation of privilege vulnerability in Windows Storage VSP Driver can be exploited remotely to gain privileges.
  62. An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
  63. A remote code execution vulnerability in SPNEGO Extended Negotiation (NEGOEX) Security Mechanism can be exploited remotely to execute arbitrary code.
  64. An information disclosure vulnerability in Windows Storage Port Driver can be exploited remotely to obtain sensitive information.
  65. An elevation of privilege vulnerability in Windows MBT Transport Driver can be exploited remotely to gain privileges.
  66. An elevation of privilege vulnerability in Windows Connected Devices Platform Service can be exploited remotely to gain privileges.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2025-49730
    critical
  • CVE-2025-47980
    high
  • CVE-2025-48819
    high
  • CVE-2025-49742
    critical
  • CVE-2025-49673
    critical
  • CVE-2025-49721
    critical
  • CVE-2025-49732
    critical
  • CVE-2025-49665
    critical
  • CVE-2025-49667
    critical
  • CVE-2025-49675
    critical
  • CVE-2025-49735
    critical
  • CVE-2025-47987
    critical
  • CVE-2025-49663
    critical
  • CVE-2025-49678
    high
  • CVE-2025-49660
    critical
  • CVE-2025-49668
    critical
  • CVE-2025-49659
    critical
  • CVE-2025-47973
    critical
  • CVE-2025-49661
    critical
  • CVE-2025-49727
    high
  • CVE-2025-48806
    critical
  • CVE-2025-47971
    critical
  • CVE-2025-48814
    critical
  • CVE-2025-48817
    critical
  • CVE-2025-48816
    critical
  • CVE-2025-49679
    critical
  • CVE-2025-48815
    critical
  • CVE-2025-48805
    critical
  • CVE-2025-49687
    critical
  • CVE-2025-49674
    critical
  • CVE-2025-47985
    critical
  • CVE-2025-47976
    critical
  • CVE-2025-47998
    critical
  • CVE-2025-49688
    critical
  • CVE-2025-49669
    critical
  • CVE-2025-49753
    critical
  • CVE-2025-49672
    critical
  • CVE-2025-49657
    critical
  • CVE-2025-49658
    high
  • CVE-2025-49664
    high
  • CVE-2025-47986
    critical
  • CVE-2025-49683
    critical
  • CVE-2025-49722
    high
  • CVE-2025-48001
    high
  • CVE-2025-48808
    high
  • CVE-2025-49686
    critical
  • CVE-2025-49716
    high
  • CVE-2025-47984
    critical
  • CVE-2025-48821
    high
  • CVE-2025-48804
    high
  • CVE-2025-47981
    critical
  • CVE-2025-49684
    high
  • CVE-2025-49681
    high
  • CVE-2025-47975
    high
  • CVE-2025-49689
    critical
  • CVE-2025-47996
    critical
  • CVE-2025-49676
    critical
  • CVE-2025-49671
    high
  • CVE-2025-48824
    critical
  • CVE-2025-49670
    critical
  • CVE-2025-49729
    critical
  • CVE-2025-49733
    critical
  • CVE-2025-48822
    critical
  • CVE-2025-48818
    high
  • CVE-2025-48811
    high
  • CVE-2025-49693
    critical
  • CVE-2025-49740
    critical
  • CVE-2025-49682
    high
  • CVE-2025-49723
    critical
  • CVE-2025-47159
    critical
  • CVE-2025-48803
    high
  • CVE-2025-36357
    high
  • CVE-2025-48809
    high
  • CVE-2025-49690
    high
  • CVE-2025-49744
    high
  • CVE-2025-47991
    critical
  • CVE-2025-47999
    high
  • CVE-2025-47993
    critical
  • CVE-2025-49725
    critical
  • CVE-2025-48810
    high
  • CVE-2025-47972
    critical
  • CVE-2025-48820
    critical
  • CVE-2025-49691
    critical
  • CVE-2025-49726
    critical
  • CVE-2025-49666
    high
  • CVE-2025-48823
    high
  • CVE-2025-49760
    warning
  • CVE-2025-48003
    high
  • CVE-2025-26636
    high
  • CVE-2025-48800
    high
  • CVE-2025-47978
    high
  • CVE-2025-48802
    high
  • CVE-2025-49677
    high
  • CVE-2025-49724
    critical
  • CVE-2025-48799
    critical
  • CVE-2025-36350
    high
  • CVE-2025-49685
    high
  • CVE-2025-49694
    critical
  • CVE-2025-33054
    critical
  • CVE-2025-49680
    high
  • CVE-2025-48002
    high
  • CVE-2025-47982
    critical
  • CVE-2025-48000
    critical

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.