Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Storage VSP Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Projected File System can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Application Information Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in DirectX Graphics Kernel can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Client-Side Caching can be exploited remotely to gain privileges.
- A remote code execution vulnerability in PowerShell can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows DWM Core Library can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows File Explorer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Brokering File System can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Camera Frame Server Monitor can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Shell can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows DirectX can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Defender Firewall Service can be exploited remotely to obtain sensitive information.
Первичный источник обнаружения
- CVE-2025-62455
CVE-2025-64673
CVE-2025-62464
CVE-2025-62572
CVE-2025-62472
CVE-2025-62456
CVE-2025-62454
CVE-2025-62457
CVE-2025-62461
CVE-2025-62470
CVE-2025-62463
CVE-2025-62466
CVE-2025-54100
CVE-2025-62473
CVE-2025-64680
CVE-2025-59517
CVE-2025-62458
CVE-2025-62565
CVE-2025-62569
CVE-2025-62465
CVE-2025-62467
CVE-2025-62570
CVE-2025-62474
CVE-2025-55233
CVE-2025-62573
CVE-2025-62571
CVE-2025-62462
CVE-2025-62549
CVE-2025-64678
CVE-2025-64661
CVE-2025-62221
CVE-2025-64670
CVE-2025-62567
CVE-2025-59516
CVE-2025-62468
CVE-2025-64658
CVE-2025-62469
CVE-2025-64679
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
- Microsoft-Windows-Server-2022
- Microsoft-Windows-Server-2025
Список CVE
- CVE-2025-54100 critical
- CVE-2025-55233 critical
- CVE-2025-59516 critical
- CVE-2025-59517 critical
- CVE-2025-62221 critical
- CVE-2025-62454 critical
- CVE-2025-62455 critical
- CVE-2025-62456 critical
- CVE-2025-62457 critical
- CVE-2025-62458 critical
- CVE-2025-62461 critical
- CVE-2025-62462 critical
- CVE-2025-62463 high
- CVE-2025-62464 critical
- CVE-2025-62465 high
- CVE-2025-62466 critical
- CVE-2025-62467 critical
- CVE-2025-62468 warning
- CVE-2025-62469 high
- CVE-2025-62470 critical
- CVE-2025-62472 critical
- CVE-2025-62473 high
- CVE-2025-62474 critical
- CVE-2025-62549 critical
- CVE-2025-62565 high
- CVE-2025-62567 high
- CVE-2025-62569 high
- CVE-2025-62570 high
- CVE-2025-62571 critical
- CVE-2025-62572 critical
- CVE-2025-62573 high
- CVE-2025-64658 critical
- CVE-2025-64661 critical
- CVE-2025-64670 high
- CVE-2025-64673 critical
- CVE-2025-64678 critical
- CVE-2025-64679 critical
- CVE-2025-64680 critical
Список KB
- 5066836
- 5066586
- 5066791
- 5066835
- 5066793
- 5066837
- 5066780
- 5066782
- 5068791
- 5068861
- 5068787
- 5068840
- 5068779
- 5068966
- 5068781
- 5068864
- 5068865
- 5071547
- 5071543
- 5074353
- 5071542
- 5071417
- 5072014
- 5071546
- 5074204
- 5071544
- 5071413
- 5072033
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!