Microsoft Patch Tuesday tháng 10/2025: Vá 172 lỗ hổng (6 zero-day)

WhiteHat Team

Administrators
Thành viên BQT
09/04/2020
116
1.182 bài viết
Microsoft Patch Tuesday tháng 10/2025: Vá 172 lỗ hổng (6 zero-day)
Microsoft vừa phát hành bản cập nhật bảo mật định kỳ Patch Tuesday tháng 10 với 172 lỗ hổng bảo mật được vá, bao gồm 6 lỗ hổng zero-day đang bị tin tặc khai thác tích cực. Đây cũng là cột mốc đặc biệt khi Windows 10 chính thức kết thúc vòng đời hỗ trợ miễn phí, khiến bản vá này trở thành “tấm khiên cuối cùng” cho hệ điều hành phổ biến này nếu người dùng không đăng ký gia hạn bảo mật trả phí.

Tiêu đề.png

Zero-day là những lỗ hổng bảo mật chưa có bản vá tại thời điểm bị khai thác. Trong đợt cập nhật này, Microsoft xác nhận ba lỗ hổng đã bị khai thác thực tế và hai lỗ hổng khác đã bị công khai trước khi có bản vá, khiến nguy cơ bị tấn công gia tăng đáng kể.

Các lỗ hổng zero-day tiêu biểu bao gồm:
  • CVE-2025-24990CVE-2025-24052: Lỗ hổng leo thang đặc quyền trong trình điều khiển Agere Modem. Tin tặc có thể lợi dụng driver hệ thống cũ này để chiếm quyền quản trị viên. Microsoft đã loại bỏ driver ltmdm64.sys trong bản vá lần này, đồng nghĩa các thiết bị fax modem liên quan có thể ngừng hoạt động.
  • CVE-2025-59230: Lỗ hổng trong Remote Access Connection Manager, cho phép tin tặc có tài khoản hợp lệ leo thang đặc quyền lên cấp SYSTEM, cấp quyền cao nhất trên Windows.
  • CVE-2025-47827: Lỗ hổng Secure Boot bypass trong IGEL OS trước bản 11, cho phép bỏ qua cơ chế xác thực khởi động an toàn.
  • CVE-2025-0033: Lỗ hổng AMD EPYC SEV-SNP, gây rủi ro cho môi trường điện toán đám mây nếu kẻ tấn công kiểm soát được hypervisor.
  • CVE-2025-2884: Lỗ hổng đọc tràn bộ nhớ (Out-of-Bounds Read) trong TCG TPM 2.0 Reference Implementation, có thể dẫn đến rò rỉ thông tin hoặc gây gián đoạn dịch vụ.
Theo Microsoft, các lỗ hổng này ảnh hưởng trên diện rộng, bao gồm nhiều phiên bản Windows và các nền tảng phần cứng, phần mềm phổ biến, trong đó có cả những linh kiện phần cứng (TPM, modem) vốn đã tồn tại từ nhiều năm trước.

Đa số các zero-day trong đợt này thuộc nhóm Elevation of Privilege (leo thang đặc quyền), chiếm tới 80 lỗ hổng trong tổng số 172. Điều này có nghĩa, tin tặc có thể không cần truy cập hệ thống từ bên ngoài, chỉ cần một tài khoản bị xâm nhập hoặc cài cắm mã độc trước đó, sau đó khai thác lỗ hổng để chiếm quyền điều khiển toàn bộ hệ thống.

Đặc biệt nguy hiểm là nhóm lỗ hổng liên quan tới driver hệ thống, quản lý kết nối từ xa và TPM/Boot, bởi đây là những thành phần nằm sâu trong lõi hệ điều hành. Khi bị khai thác, các giải pháp bảo mật thông thường như antivirus hoặc EDR có thể khó phát hiện hoặc ngăn chặn kịp thời.

Mức độ rủi ro càng cao trong môi trường doanh nghiệp khi nhiều thiết bị Windows chưa được vá hoặc còn chạy Windows 10, hệ điều hành vừa chính thức kết thúc hỗ trợ miễn phí. Các tổ chức không có chính sách quản lý bản vá chặt chẽ sẽ trở thành mục tiêu hấp dẫn cho các nhóm APT hoặc ransomware.

Không chỉ Microsoft, hàng loạt hãng công nghệ lớn cũng đồng loạt công bố bản vá bảo mật trong tháng 10:
  • Adobe vá lỗi trong nhiều sản phẩm phổ biến.
  • Cisco vá lỗi nghiêm trọng trong IOS và Unified Communications Manager.
  • Draytek, Ivanti, Oracle, Redis, SAP, Synacor (Zimbra) cũng phát hành bản vá cho các lỗ hổng đang bị khai thác.
Điều này cho thấy bức tranh an ninh mạng tháng 10 không chỉ xoay quanh Microsoft mà là một đợt cao điểm tấn công mạng quy mô toàn cầu.

Trước làn sóng khai thác zero-day ngày càng gia tăng, các chuyên gia an ninh mạng khuyến cáo:
  • Cập nhật bản vá ngay lập tức trên tất cả hệ thống Windows, đặc biệt là server và máy tính đầu cuối.
  • Loại bỏ hoặc vô hiệu hóa phần cứng / driver cũ (như modem Agere) nếu không còn cần thiết.
  • Xem xét kế hoạch nâng cấp từ Windows 10 lên Windows 11 hoặc đăng ký ESU để tiếp tục nhận bản vá.
  • Với doanh nghiệp, triển khai chính sách quản lý bản vá tập trung, ưu tiên xử lý các lỗ hổng zero-day có khả năng bị khai thác.
  • Giám sát hệ thống chặt chẽ, đặc biệt các hành vi leo thang đặc quyền, khởi động bất thường hoặc thao tác với TPM/Secure Boot.
Dưới đây là danh sách các lỗ hổng và hệ thống bị ảnh hưởng:

STT​
Tag​
CVE ID​
CVE Title​
Severity
1.NETCVE-2025-55247.NET Elevation of Privilege VulnerabilityImportant
2.NET, .NET Framework, Visual StudioCVE-2025-55248.NET, .NET Framework, and Visual Studio Information Disclosure VulnerabilityImportant
3Active Directory Federation ServicesCVE-2025-59258Windows Active Directory Federation Services (ADFS) Information Disclosure VulnerabilityImportant
4Agere Windows Modem DriverCVE-2025-24990Windows Agere Modem Driver Elevation of Privilege VulnerabilityImportant
5Agere Windows Modem DriverCVE-2025-24052Windows Agere Modem Driver Elevation of Privilege VulnerabilityImportant
6AMD Restricted Memory PageCVE-2025-0033AMD CVE-2025-0033: RMP Corruption During SNP InitializationCritical
7ASP.NET CoreCVE-2025-55315ASP.NET Security Feature Bypass VulnerabilityImportant
8Azure Connected Machine AgentCVE-2025-47989Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
9Azure Connected Machine AgentCVE-2025-58724Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
10Azure Entra IDCVE-2025-59218Azure Entra ID Elevation of Privilege VulnerabilityCritical
11Azure Entra IDCVE-2025-59246Azure Entra ID Elevation of Privilege VulnerabilityCritical
12Azure LocalCVE-2025-55697Azure Local Elevation of Privilege VulnerabilityImportant
13Azure MonitorCVE-2025-55321Azure Monitor Log Analytics Spoofing VulnerabilityCritical
14Azure Monitor AgentCVE-2025-59285Azure Monitor Agent Elevation of Privilege VulnerabilityImportant
15Azure Monitor AgentCVE-2025-59494Azure Monitor Agent Elevation of Privilege VulnerabilityImportant
16Azure PlayFabCVE-2025-59247Azure PlayFab Elevation of Privilege VulnerabilityCritical
17Confidential Azure Container InstancesCVE-2025-59292Azure Compute Gallery Elevation of Privilege VulnerabilityCritical
18Confidential Azure Container InstancesCVE-2025-59291Confidential Azure Container Instances Elevation of Privilege VulnerabilityCritical
19Connected Devices Platform Service (Cdpsvc)CVE-2025-59191Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
20Connected Devices Platform Service (Cdpsvc)CVE-2025-55326Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution VulnerabilityImportant
21Connected Devices Platform Service (Cdpsvc)CVE-2025-58719Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
22CopilotCVE-2025-59272Copilot Spoofing VulnerabilityCritical
23CopilotCVE-2025-59252M365 Copilot Spoofing VulnerabilityCritical
24CopilotCVE-2025-59286Copilot Spoofing VulnerabilityCritical
25Data Sharing Service ClientCVE-2025-59200Data Sharing Service Spoofing VulnerabilityImportant
26GamesCVE-2025-59489MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerabilityImportant
27GitHubCVE-2025-59288Playwright Spoofing VulnerabilityModerate
28Inbox COM ObjectsCVE-2025-58735Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
29Inbox COM ObjectsCVE-2025-58732Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
30Inbox COM ObjectsCVE-2025-59282Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
31Inbox COM ObjectsCVE-2025-58733Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
32Inbox COM ObjectsCVE-2025-58734Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
33Inbox COM ObjectsCVE-2025-58738Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
34Inbox COM ObjectsCVE-2025-58731Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
35Inbox COM ObjectsCVE-2025-58730Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
36Inbox COM ObjectsCVE-2025-58736Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
37Internet ExplorerCVE-2025-59295Windows URL Parsing Remote Code Execution VulnerabilityImportant
38JDBC Driver for SQL ServerCVE-2025-59250JDBC Driver for SQL Server Spoofing VulnerabilityImportant
39MarinerCVE-2025-39943ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transferCritical
40MarinerCVE-2025-39946tls: make sure to abort the stream if headers are bogusModerate
41MarinerCVE-2025-39942ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_sizeModerate
42MarinerCVE-2025-39951um: virtio_uml: Fix use-after-free after put_device in probeModerate
43MarinerCVE-2025-39932smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)Moderate
44MarinerCVE-2025-39949qed: Don't collect too many protection override GRC elementsModerate
45MarinerCVE-2025-39937net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointerModerate
46MarinerCVE-2025-39955tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().Moderate
47MarinerCVE-2025-39895sched: Fix sched_numa_find_nth_cpu() if mask offlineModerate
48MarinerCVE-2025-11413GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-boundsModerate
49MarinerCVE-2025-11414GNU Binutils Linker elflink.c get_link_hash_entry out-of-boundsModerate
50MarinerCVE-2025-39938ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failedModerate
51MarinerCVE-2025-11495GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflowModerate
52MarinerCVE-2025-39934drm: bridge: anx7625: Fix NULL pointer dereference with early IRQModerate
53MarinerCVE-2025-39929smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error pathModerate
54MarinerCVE-2025-39945cnic: Fix use-after-free bugs in cnic_delete_taskImportant
55MarinerCVE-2025-39907mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC bufferCritical
56MarinerCVE-2025-39913tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.Moderate
57MarinerCVE-2025-39952wifi: wilc1000: avoid buffer overflow in WID string configurationImportant
58MarinerCVE-2025-39940dm-stripe: fix a possible integer overflowModerate
59MarinerCVE-2025-39953cgroup: split cgroup_destroy_wq into 3 workqueuesModerate
60MarinerCVE-2023-53469af_unix: Fix null-ptr-deref in unix_stream_sendpage().Important
61MarinerCVE-2025-39914tracing: Silence warning when chunk allocation fails in trace_pid_writeModerate
62MarinerCVE-2025-39905net: phylink: add lock for serializing concurrent pl->phydev writes with resolverModerate
63MarinerCVE-2025-39920pcmcia: Add error handling for add_interval() in do_validate_mem()Moderate
64MarinerCVE-2025-39911i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error pathLow
65MarinerCVE-2025-39958iommu/s390: Make attach succeed when the device was surprise removedLow
66MarinerCVE-2025-8291ZIP64 End of Central Directory (EOCD) Locator record offset not checkedModerate
67MarinerCVE-2025-39957wifi: mac80211: increase scan_ies_len for S1GLow
68MarinerCVE-2025-46818Redis: Authenticated users can execute LUA scripts as a different userModerate
69MarinerCVE-2025-46817Lua library commands may lead to integer overflow and potential RCEImportant
70MarinerCVE-2022-50502mm: /proc/pid/smaps_rollup: fix no vma's null-derefModerate
71MarinerCVE-2025-39944octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()Important
72MarinerCVE-2025-11234Qemu-kvm: vnc websocket handshake use-after-freeModerate
73MarinerCVE-2025-49844Redis Lua Use-After-Free may lead to remote code executionCritical
74MarinerCVE-2025-10729Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVGImportant
75MarinerCVE-2025-39961iommu/amd/pgtbl: Fix possible race while increase page table levelModerate
76MarinerCVE-2025-61984ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)Low
77MarinerCVE-2025-46819Redis is vulnerable to DoS via specially crafted LUA scriptsModerate
78MarinerCVE-2025-37727Elasticsearch Insertion of sensitive information in log fileModerate
79MarinerCVE-2025-11412GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-boundsModerate
80MarinerCVE-2025-39931crypto: af_alg - Set merge to zero early in af_alg_sendmsgModerate
81MarinerCVE-2025-39933smb: client: let recv_done verify data_offset, data_length and remaining_data_lengthModerate
82MarinerCVE-2025-39947net/mlx5e: Harden uplink netdev access against device unbindModerate
83MarinerCVE-2025-61985ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.Low
84MarinerCVE-2025-10728Uncontrolled recursion in Qt SVG moduleImportant
85MarinerCVE-2025-39916mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()Moderate
86MarinerCVE-2025-39902mm/slub: avoid accessing metadata when pointer is invalid in object_err()Moderate
87MarinerCVE-2025-39923dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/eesModerate
88MarinerCVE-2025-39898e1000e: fix heap overflow in e1000_set_eepromCritical
89MarinerCVE-2025-39925can: j1939: implement NETDEV_UNREGISTER notification handlerCritical
90MarinerCVE-2025-39891wifi: mwifiex: Initialize the chan_stats array to zeroModerate
91MarinerCVE-2025-39927ceph: fix race condition validating r_parent before applying stateModerate
92MarinerCVE-2025-39901i40e: remove read access to debugfs filesImportant
93MarinerCVE-2025-39910mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()Critical
94MarinerCVE-2025-39909mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()Moderate
95Microsoft Brokering File SystemCVE-2025-48004Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
96Microsoft Brokering File SystemCVE-2025-59189Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
97Microsoft Configuration ManagerCVE-2025-55320Configuration Manager Elevation of Privilege VulnerabilityImportant
98Microsoft Configuration ManagerCVE-2025-59213Configuration Manager Elevation of Privilege VulnerabilityImportant
99Microsoft Defender for LinuxCVE-2025-59497Microsoft Defender for Linux Denial of Service VulnerabilityImportant
100Microsoft Edge (Chromium-based)CVE-2025-11213Chromium: CVE-2025-11213 Inappropriate implementation in OmniboxUnknown
101Microsoft Edge (Chromium-based)CVE-2025-11210Chromium: CVE-2025-11210 Side-channel information leakage in TabUnknown
102Microsoft Edge (Chromium-based)CVE-2025-11460Chromium: CVE-2025-11460 Use after free in StorageUnknown
103Microsoft Edge (Chromium-based)CVE-2025-11458Chromium: CVE-2025-11458 Heap buffer overflow in SyncUnknown
104Microsoft Edge (Chromium-based)CVE-2025-11215Chromium: CVE-2025-11215 Off by one error in V8Unknown
105Microsoft Edge (Chromium-based)CVE-2025-11216Chromium: CVE-2025-11216 Inappropriate implementation in StorageUnknown
106Microsoft Edge (Chromium-based)CVE-2025-11208Chromium: CVE-2025-11208 Inappropriate implementation in MediaUnknown
107Microsoft Edge (Chromium-based)CVE-2025-11212Chromium: CVE-2025-11212 Inappropriate implementation in MediaUnknown
108Microsoft Edge (Chromium-based)CVE-2025-11211Chromium: CVE-2025-11211 Out of bounds read in MediaUnknown
109Microsoft Edge (Chromium-based)CVE-2025-11205Chromium: CVE-2025-11205 Heap buffer overflow in WebGPUUnknown
110Microsoft Edge (Chromium-based)CVE-2025-11207Chromium: CVE-2025-11207 Side-channel information leakage in StorageUnknown
111Microsoft Edge (Chromium-based)CVE-2025-11209Chromium: CVE-2025-11209 Inappropriate implementation in OmniboxUnknown
112Microsoft Edge (Chromium-based)CVE-2025-11206Chromium: CVE-2025-11206 Heap buffer overflow in VideoUnknown
113Microsoft Edge (Chromium-based)CVE-2025-11219Chromium: CVE-2025-11219 Use after free in V8Unknown
114Microsoft Exchange ServerCVE-2025-59248Microsoft Exchange Server Spoofing VulnerabilityImportant
115Microsoft Exchange ServerCVE-2025-59249Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
116Microsoft Exchange ServerCVE-2025-53782Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
117Microsoft Failover Cluster Virtual DriverCVE-2025-59260Microsoft Failover Cluster Virtual Driver Information Disclosure VulnerabilityImportant
118Microsoft Graphics ComponentCVE-2025-59195Microsoft Graphics Component Denial of Service VulnerabilityImportant
119Microsoft Graphics ComponentCVE-2016-9535MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow VulnerabilityCritical
120Microsoft Graphics ComponentCVE-2025-59261Windows Graphics Component Elevation of Privilege VulnerabilityImportant
121Microsoft Graphics ComponentCVE-2025-49708Microsoft Graphics Component Elevation of Privilege VulnerabilityCritical
122Microsoft Graphics ComponentCVE-2025-59205Windows Graphics Component Elevation of Privilege VulnerabilityImportant
123Microsoft OfficeCVE-2025-59229Microsoft Office Denial of Service VulnerabilityImportant
124Microsoft OfficeCVE-2025-59227Microsoft Office Remote Code Execution VulnerabilityCritical
125Microsoft OfficeCVE-2025-59234Microsoft Office Remote Code Execution VulnerabilityCritical
126Microsoft Office ExcelCVE-2025-59223Microsoft Excel Remote Code Execution VulnerabilityImportant
127Microsoft Office ExcelCVE-2025-59224Microsoft Excel Remote Code Execution VulnerabilityImportant
128Microsoft Office ExcelCVE-2025-59225Microsoft Excel Remote Code Execution VulnerabilityImportant
129Microsoft Office ExcelCVE-2025-59232Microsoft Excel Information Disclosure VulnerabilityImportant
130Microsoft Office ExcelCVE-2025-59235Microsoft Excel Information Disclosure VulnerabilityImportant
131Microsoft Office ExcelCVE-2025-59233Microsoft Excel Remote Code Execution VulnerabilityImportant
132Microsoft Office ExcelCVE-2025-59231Microsoft Excel Remote Code Execution VulnerabilityImportant
133Microsoft Office ExcelCVE-2025-59236Microsoft Excel Remote Code Execution VulnerabilityCritical
134Microsoft Office ExcelCVE-2025-59243Microsoft Excel Remote Code Execution VulnerabilityImportant
135Microsoft Office PowerPointCVE-2025-59238Microsoft PowerPoint Remote Code Execution VulnerabilityImportant
136Microsoft Office SharePointCVE-2025-59237Microsoft SharePoint Remote Code Execution VulnerabilityImportant
137Microsoft Office SharePointCVE-2025-59228Microsoft SharePoint Remote Code Execution VulnerabilityImportant
138Microsoft Office VisioCVE-2025-59226Microsoft Office Visio Remote Code Execution VulnerabilityImportant
139Microsoft Office WordCVE-2025-59222Microsoft Word Remote Code Execution VulnerabilityImportant
140Microsoft Office WordCVE-2025-59221Microsoft Word Remote Code Execution VulnerabilityImportant
141Microsoft PowerShellCVE-2025-25004PowerShell Elevation of Privilege VulnerabilityImportant
142Microsoft WindowsCVE-2025-55701Windows Authentication Elevation of Privilege VulnerabilityImportant
143Microsoft Windows Codecs LibraryCVE-2025-54957MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoderImportant
144Microsoft Windows Search ComponentCVE-2025-59198Windows Search Service Denial of Service VulnerabilityImportant
145Microsoft Windows Search ComponentCVE-2025-59190Windows Search Service Denial of Service VulnerabilityImportant
146Microsoft Windows Search ComponentCVE-2025-59253Windows Search Service Denial of Service VulnerabilityImportant
147Microsoft Windows SpeechCVE-2025-58715Windows Speech Runtime Elevation of Privilege VulnerabilityImportant
148Microsoft Windows SpeechCVE-2025-58716Windows Speech Runtime Elevation of Privilege VulnerabilityImportant
149Network Connection Status Indicator (NCSI)CVE-2025-59201Network Connection Status Indicator (NCSI) Elevation of Privilege VulnerabilityImportant
150NtQueryInformation Token function (ntifs.h)CVE-2025-55696NtQueryInformation Token function (ntifs.h) Elevation of Privilege VulnerabilityImportant
151Redis EnterpriseCVE-2025-59271Redis Enterprise Elevation of Privilege VulnerabilityCritical
152Remote Desktop ClientCVE-2025-58718Remote Desktop Client Remote Code Execution VulnerabilityImportant
153Software Protection Platform (SPP)CVE-2025-59199Software Protection Platform (SPP) Elevation of Privilege VulnerabilityImportant
154Storport.sys DriverCVE-2025-59192Storport.sys Driver Elevation of Privilege VulnerabilityImportant
155TCG TPM2.0CVE-2025-2884Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementationImportant
156Virtual Secure ModeCVE-2025-48813Virtual Secure Mode Spoofing VulnerabilityImportant
157Visual StudioCVE-2025-55240Visual Studio Elevation of Privilege VulnerabilityImportant
158Visual StudioCVE-2025-54132GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram ToolImportant
159Windows Ancillary Function Driver for WinSockCVE-2025-58714Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
160Windows Ancillary Function Driver for WinSockCVE-2025-59242Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
161Windows Authentication MethodsCVE-2025-59277Windows Authentication Elevation of Privilege VulnerabilityImportant
162Windows Authentication MethodsCVE-2025-59278Windows Authentication Elevation of Privilege VulnerabilityImportant
163Windows Authentication MethodsCVE-2025-59275Windows Authentication Elevation of Privilege VulnerabilityImportant
164Windows BitLockerCVE-2025-55337Windows BitLocker Security Feature Bypass VulnerabilityImportant
165Windows BitLockerCVE-2025-55332Windows BitLocker Security Feature Bypass VulnerabilityImportant
166Windows BitLockerCVE-2025-55333Windows BitLocker Security Feature Bypass VulnerabilityImportant
167Windows BitLockerCVE-2025-55330Windows BitLocker Security Feature Bypass VulnerabilityImportant
168Windows BitLockerCVE-2025-55338Windows BitLocker Security Feature Bypass VulnerabilityImportant
169Windows BitLockerCVE-2025-55682Windows BitLocker Security Feature Bypass VulnerabilityImportant
170Windows Bluetooth ServiceCVE-2025-59290Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
171Windows Bluetooth ServiceCVE-2025-58728Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
172Windows Bluetooth ServiceCVE-2025-59289Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
173Windows Cloud Files Mini Filter DriverCVE-2025-55680Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
174Windows Cloud Files Mini Filter DriverCVE-2025-55336Windows Cloud Files Mini Filter Driver Information Disclosure VulnerabilityImportant
175Windows COMCVE-2025-58725Windows COM+ Event System Service Elevation of Privilege VulnerabilityImportant
176Windows Connected Devices Platform ServiceCVE-2025-58727Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
177Windows Core ShellCVE-2025-59185NTLM Hash Disclosure Spoofing VulnerabilityImportant
178Windows Core ShellCVE-2025-59244NTLM Hash Disclosure Spoofing VulnerabilityImportant
179Windows Cryptographic ServicesCVE-2025-58720Windows Cryptographic Services Information Disclosure VulnerabilityImportant
180Windows Device Association Broker serviceCVE-2025-50174Windows Device Association Broker Service Elevation of Privilege VulnerabilityImportant
181Windows Device Association Broker serviceCVE-2025-55677Windows Device Association Broker Service Elevation of Privilege VulnerabilityImportant
182Windows Digital MediaCVE-2025-53150Windows Digital Media Elevation of Privilege VulnerabilityImportant
183Windows Digital MediaCVE-2025-50175Windows Digital Media Elevation of Privilege VulnerabilityImportant
184Windows DirectXCVE-2025-55678DirectX Graphics Kernel Elevation of Privilege VulnerabilityImportant
185Windows DirectXCVE-2025-55698DirectX Graphics Kernel Denial of Service VulnerabilityImportant
186Windows DWMCVE-2025-58722Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
187Windows DWMCVE-2025-55681Desktop Windows Manager Elevation of Privilege VulnerabilityImportant
188Windows DWM Core LibraryCVE-2025-59255Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
189Windows DWM Core LibraryCVE-2025-59254Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
190Windows Error ReportingCVE-2025-55692Windows Error Reporting Service Elevation of Privilege VulnerabilityImportant
191Windows Error ReportingCVE-2025-55694Windows Error Reporting Service Elevation of Privilege VulnerabilityImportant
192Windows ETL ChannelCVE-2025-59197Windows ETL Channel Information Disclosure VulnerabilityImportant
193Windows Failover ClusterCVE-2025-59188Microsoft Failover Cluster Information Disclosure VulnerabilityImportant
194Windows Failover ClusterCVE-2025-47979Microsoft Failover Cluster Information Disclosure VulnerabilityImportant
195Windows File ExplorerCVE-2025-59214Microsoft Windows File Explorer Spoofing VulnerabilityImportant
196Windows File ExplorerCVE-2025-58739Microsoft Windows File Explorer Spoofing VulnerabilityImportant
197Windows Health and Optimized Experiences ServiceCVE-2025-59241Windows Health and Optimized Experiences Elevation of Privilege VulnerabilityImportant
198Windows HelloCVE-2025-53139Windows Hello Security Feature Bypass VulnerabilityImportant
199Windows High Availability ServicesCVE-2025-59184Storage Spaces Direct Information Disclosure VulnerabilityImportant
200Windows Hyper-VCVE-2025-55328Windows Hyper-V Elevation of Privilege VulnerabilityImportant
201Windows KernelCVE-2025-55679Windows Kernel Information Disclosure VulnerabilityImportant
202Windows KernelCVE-2025-55683Windows Kernel Information Disclosure VulnerabilityImportant
203Windows KernelCVE-2025-59207Windows Kernel Elevation of Privilege VulnerabilityImportant
204Windows KernelCVE-2025-55334Windows Kernel Security Feature Bypass VulnerabilityImportant
205Windows KernelCVE-2025-59186Windows Kernel Information Disclosure VulnerabilityImportant
206Windows KernelCVE-2025-55693Windows Kernel Elevation of Privilege VulnerabilityImportant
207Windows KernelCVE-2025-59194Windows Kernel Elevation of Privilege VulnerabilityImportant
208Windows KernelCVE-2025-59187Windows Kernel Elevation of Privilege VulnerabilityImportant
209Windows KernelCVE-2025-50152Windows Kernel Elevation of Privilege VulnerabilityImportant
210Windows KernelCVE-2025-55699Windows Kernel Information Disclosure VulnerabilityImportant
211Windows Local Session Manager (LSM)CVE-2025-58729Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
212Windows Local Session Manager (LSM)CVE-2025-59257Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
213Windows Local Session Manager (LSM)CVE-2025-59259Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
214Windows Management ServicesCVE-2025-59193Windows Management Services Elevation of Privilege VulnerabilityImportant
215Windows Management ServicesCVE-2025-59204Windows Management Services Information Disclosure VulnerabilityImportant
216Windows MapUrlToZoneCVE-2025-59208Windows MapUrlToZone Information Disclosure VulnerabilityImportant
217Windows NDISCVE-2025-55339Windows Network Driver Interface Specification Driver Elevation of Privilege VulnerabilityImportant
218Windows NTFSCVE-2025-55335Windows NTFS Elevation of Privilege VulnerabilityImportant
219Windows NTLMCVE-2025-59284Windows NTLM Spoofing VulnerabilityImportant
220Windows PrintWorkflowUserSvcCVE-2025-55331Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
221Windows PrintWorkflowUserSvcCVE-2025-55689Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
222Windows PrintWorkflowUserSvcCVE-2025-55685Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
223Windows PrintWorkflowUserSvcCVE-2025-55686Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
224Windows PrintWorkflowUserSvcCVE-2025-55690Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
225Windows PrintWorkflowUserSvcCVE-2025-55684Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
226Windows PrintWorkflowUserSvcCVE-2025-55688Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
227Windows PrintWorkflowUserSvcCVE-2025-55691Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
228Windows Push Notification CoreCVE-2025-59209Windows Push Notification Information Disclosure VulnerabilityImportant
229Windows Push Notification CoreCVE-2025-59211Windows Push Notification Information Disclosure VulnerabilityImportant
230Windows Remote Access Connection ManagerCVE-2025-59230Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
231Windows Remote DesktopCVE-2025-58737Remote Desktop Protocol Remote Code Execution VulnerabilityImportant
232Windows Remote Desktop ProtocolCVE-2025-55340Windows Remote Desktop Protocol Security Feature BypassImportant
233Windows Remote Desktop ServicesCVE-2025-59202Windows Remote Desktop Services Elevation of Privilege VulnerabilityImportant
234Windows Remote Procedure CallCVE-2025-59502Remote Procedure Call Denial of Service VulnerabilityModerate
235Windows Resilient File System (ReFS)CVE-2025-55687Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityImportant
236Windows Resilient File System (ReFS) Deduplication ServiceCVE-2025-59210Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege VulnerabilityImportant
237Windows Resilient File System (ReFS) Deduplication ServiceCVE-2025-59206Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege VulnerabilityImportant
238Windows Routing and Remote Access Service (RRAS)CVE-2025-58717Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
239Windows Routing and Remote Access Service (RRAS)CVE-2025-55700Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
240Windows Secure BootCVE-2025-47827MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11Important
241Windows Server Update ServiceCVE-2025-59287Windows Server Update Service (WSUS) Remote Code Execution VulnerabilityCritical
242Windows SMB ClientCVE-2025-59280Windows SMB Client Tampering VulnerabilityImportant
243Windows SMB ServerCVE-2025-58726Windows SMB Server Elevation of Privilege VulnerabilityImportant
244Windows SSDP ServiceCVE-2025-59196Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege VulnerabilityImportant
245Windows StateRepository APICVE-2025-59203Windows State Repository API Server File Information Disclosure VulnerabilityImportant
246Windows Storage Management ProviderCVE-2025-55325Windows Storage Management Provider Information Disclosure VulnerabilityImportant
247Windows Taskbar LiveCVE-2025-59294Windows Taskbar Live Preview Information Disclosure VulnerabilityImportant
248Windows USB Video DriverCVE-2025-55676Windows USB Video Class System Driver Information Disclosure VulnerabilityImportant
249Windows Virtualization-Based Security (VBS) EnclaveCVE-2025-53717Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityImportant
250Windows WLAN Auto Config ServiceCVE-2025-55695Windows WLAN AutoConfig Service Information Disclosure VulnerabilityImportant
251XboxCVE-2025-53768Xbox IStorageService Elevation of Privilege VulnerabilityImportant
252XBox Gaming ServicesCVE-2025-59281Xbox Gaming Services Elevation of Privilege VulnerabilityImportant

WhiteHat
 
Mời các bạn tham gia Group WhiteHat để thảo luận và cập nhật tin tức an ninh mạng hàng ngày.
Lưu ý từ WhiteHat: Kiến thức an ninh mạng để phòng chống, không làm điều xấu. Luật pháp liên quan
Thẻ
microsoft patch tuesday october 2025 zero-day
Bên trên