Microsoft’s August Security Update High-Risk Vulnerability Notice for Multiple Products

Microsoft’s August Security Update High-Risk Vulnerability Notice for Multiple Products

August 14, 2025 | NSFOCUS

Overview

On August 13, NSFOCUS CERT detected that Microsoft released the August Security Update patch, which fixed 111 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Visual Studio, and Microsoft Exchange Server. These include high-risk vulnerability types such as privilege escalation and remote code execution.

Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 17 critical vulnerabilities, 91 important vulnerabilities, and 2 moderate vulnerabilities.

Users should update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.

Reference link: https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-Aug

Key Vulnerabilities

Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention to:

Windows Graphics Component Remote Code Execution Vulnerability (CVE-2025-50165):

A remote code execution vulnerability exists in the Windows Graphics Component, which allows an unauthenticated attacker to remotely execute code on the target system through a specially crafted JPEG image (which can be embedded in Office or other files) due to untrusted pointer dereferences in Microsoft Graphics Component. CVSS score is 9.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-50165

Windows GDI Remote Code Execution Vulnerability (CVE-2025-53766):

A remote code execution vulnerability exists in Windows GDI. Due to a heap-based buffer overflow in Windows GDI+, an unauthenticated attacker can execute arbitrary code by tricking the user into downloading and opening a document containing a specially crafted metafile. CVSS score is 9.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-53766

Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2025-49712):

A remote code execution vulnerability exists in Microsoft SharePoint, which allows an authenticated remote attacker to execute arbitrary code due to the deserialization of untrusted data in Microsoft Office SharePoint. CVSS score is 8.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-49712

Microsoft Word Remote Code Execution Vulnerability (CVE-2025-53733):

A remote code execution vulnerability exists in Microsoft Word. Due to improper number type conversion in Microsoft Office Word, an unauthenticated attacker can execute arbitrary code in the user’s context by crafting a malicious file that tricks the user into opening or previewing a pane. CVSS score is 8.4.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-53733

Windows NTLM Privilege Escalation Vulnerability (CVE-2025-53778):

A privilege escalation vulnerability exists in Windows NTLM, which can be exploited by an authenticated local attacker to gain system SYSTEM privileges due to improper authentication in Windows NTLM. CVSS score is 8.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-53778

Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability (CVE-2025-50177):

A remote code execution vulnerability exists in Microsoft Message Queues (MSMQ). Due to the Use-After-Free nature of Windows message queues, an unauthenticated attacker can achieve remote code execution on the target server by sending a batch of specially crafted HTTP packets to the MSMQ server for race conditions.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-50177

Microsoft SQL Server Privilege Escalation Vulnerability (CVE-2025-24999):

There is a privilege escalation vulnerability in Microsoft SQL Server. Due to improper access control of SQL Server, an authenticated attacker can obtain sysadmin permissions on the target system through the network. CVSS score is 8.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24999

Azure Portal Privilege Escalation Vulnerability (CVE-2025-53792):

There is a privilege escalation vulnerability in the Azure portal. Due to improper authorization in the Azure Windows virtual machine agent, an unauthenticated attacker can escalate privileges through the network. CVSS score is 9.1.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-53792

Remote Desktop Spoofing Vulnerability (CVE-2025-50171):

There is a spoofing vulnerability in Remote Desktop. Due to the lack of authorization from the remote desktop server, an unauthenticated attacker can perform spoofing attacks on the network. CVSS score is 9.1.

Official announcement link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-50171

Scope of Impact

The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.

Vulnerability NumberAffected product versions
CVE-2025-50165Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
CVE-2025-53766Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
CVE-2025-49712Microsoft SharePoint Server 2019
Microsoft SharePoint Enterprise Server 2016
CVE-2025-53733Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for 32-bit editions
Microsoft SharePoint Server 2019
Microsoft SharePoint Enterprise Server 2016
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Word 2016 (64-bit edition)
Microsoft Word 2016 (32-bit edition)
Microsoft Office LTSC for Mac 2024
Microsoft Office LTSC 2024 for 64-bit editions
Microsoft Office LTSC 2024 for 32-bit editions
Microsoft Office LTSC 2021 for 32-bit editions
CVE-2025-53778Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
CVE-2025-50177Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
CVE-2025-24999Microsoft SQL Server 2022 for x64-based Systems (CU 20)
Microsoft SQL Server 2019 for x64-based Systems (CU 32)
Microsoft SQL Server 2022 for x64-based Systems (GDR)
Microsoft SQL Server 2017 for x64-based Systems (CU 31)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)
Microsoft SQL Server 2019 for x64-based Systems (GDR)
Microsoft SQL Server 2017 for x64-based Systems (GDR)
CVE-2025-53792Azure Portal
CVE-2025-50171Windows Server 2025
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2025 (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022

Mitigation

Patch update

At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link: https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-Aug

Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.

Right-click the Windows icon, select “Settings (N)”, select “Update and Security”- “Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.

For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.

Appendix: Vulnerability List

Affected productsCVE No.Vulnerability TitleSeverity
Microsoft 365 Copilot’s Business ChatCVE-2025-53787Microsoft 365 Copilot BizChat Information Disclosure VulnerabilityCritical
Microsoft 365 Copilot’s Business ChatCVE-2025-53774Microsoft 365 Copilot BizChat Information Disclosure VulnerabilityCritical
Azure PortalCVE-2025-53792Azure portal privilege escalation vulnerabilityCritical
Azure OpenAICVE-2025-53767Azure OpenAI Privilege Escalation VulnerabilityCritical
Azure Virtual MachinesCVE-2025-49707Azure Virtual Machines Spoofing VulnerabilityCritical
Role: Windows Hyper-VCVE-2025-48807Windows Hyper-V Remote Code Execution VulnerabilityCritical
Azure StackCVE-2025-53793Azure Stack Hub Information Disclosure VulnerabilityCritical
Microsoft Office WordCVE-2025-53784Microsoft Word Remote Code Execution VulnerabilityCritical
Windows NTLMCVE-2025-53778Windows NTLM Privilege Escalation VulnerabilityCritical
Windows GDI+CVE-2025-53766GDI remote code execution vulnerabilityCritical
Microsoft OfficeCVE-2025-53740Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft Office WordCVE-2025-53733Microsoft Word Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-53731Microsoft Office Remote Code Execution VulnerabilityCritical
Windows Message QueuingCVE-2025-50177Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityCritical
Graphics KernelCVE-2025-50176DirectX graphics kernel remote code execution vulnerabilityCritical
Microsoft Graphics ComponentCVE-2025-50165Windows Graphics Component Remote Code Execution VulnerabilityCritical
Azure Virtual MachinesCVE-2025-53781Azure Virtual Machines Information Disclosure VulnerabilityCritical
Microsoft Office SharePointCVE-2025-49712Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Windows StateRepository APICVE-2025-53789Windows StateRepository API Server File Privilege Escalation VulnerabilityImportant
Windows Subsystem for LinuxCVE-2025-53788Windows Subsystem for Linux (WSL2) Kernel Privilege Escalation VulnerabilityImportant
Microsoft TeamsCVE-2025-53783Microsoft Teams Remote Code Execution VulnerabilityImportant
Windows Push NotificationsCVE-2025-50155Privilege escalation vulnerability in Windows push notification applicationImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-50157Windows Routing and Remote Access Service (RRAS) information disclosure vulnerabilityImportant
Windows Security AppCVE-2025-53769Windows Security Application Spoofing VulnerabilityImportant
Azure StackCVE-2025-53765Azure Stack Hub Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2025-53739Microsoft Excel remote code execution vulnerabilityImportant
Microsoft Office WordCVE-2025-53738Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-53737Microsoft Excel remote code execution vulnerabilityImportant
Microsoft Office WordCVE-2025-53736Microsoft Word Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2025-53735Microsoft Excel remote code execution vulnerabilityImportant
Microsoft Office VisioCVE-2025-53734Microsoft Office Visio Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-53732Microsoft Office Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2025-47954Microsoft SQL Server Privilege Escalation VulnerabilityImportant
Microsoft Dynamics 365 (on-premises)CVE-2025-53728Microsoft Dynamics 365 (Local) Information Disclosure VulnerabilityImportant
Windows Push NotificationsCVE-2025-53726Privilege escalation vulnerability in Windows push notification applicationImportant
Windows Push NotificationsCVE-2025-53725Privilege escalation vulnerability in Windows push notification applicationImportant
Windows Push NotificationsCVE-2025-53724Privilege escalation vulnerability in Windows push notification applicationImportant
Role: Windows Hyper-VCVE-2025-53723Windows Hyper-V Privilege Escalation VulnerabilityImportant
Windows Remote Desktop ServicesCVE-2025-53722Windows Remote Desktop Services Denial of Service VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2025-53721Windows Connected Device Platform Service Privilege Escalation VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53720Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53719Windows Routing and Remote Access Service (RRAS) information disclosure vulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-53718Windows Accessibility Driver Privilege Escalation Vulnerability for WinSockImportant
Windows Local Security Authority Subsystem Service (LSASS)CVE-2025-53716Local Security Authentication Subsystem Service (LSASS) Denial of service vulnerabilityImportant
Storage Port DriverCVE-2025-53156Windows Storage Port Driver Information Disclosure VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-53155Windows Hyper-V Privilege Escalation VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-53154Windows Accessibility Driver Privilege Escalation Vulnerability for WinSockImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53153Windows Routing and Remote Access Service (RRAS) information disclosure vulnerabilityImportant
Desktop Windows ManagerCVE-2025-53152Desktop Window Manager Remote Code Execution VulnerabilityImportant
Windows KernelCVE-2025-53151Windows Kernel Privilege Escalation VulnerabilityImportant
Kernel Streaming WOW Thunk Service DriverCVE-2025-53149Kernel Streaming WOW Thunk service driver privilege escalation vulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53148Windows Routing and Remote Access Service (RRAS) information disclosure vulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-53147Windows Accessibility Driver Privilege Escalation Vulnerability for WinSockImportant
Windows Message QueuingCVE-2025-53145Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityImportant
Windows Message QueuingCVE-2025-53144Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityImportant
Windows Message QueuingCVE-2025-53143Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityImportant
Microsoft Brokering File SystemCVE-2025-53142Microsoft proxy file system privilege escalation vulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-53141Windows Accessibility Driver Privilege Escalation Vulnerability for WinSockImportant
Kernel Transaction ManagerCVE-2025-53140Windows Kernel Transaction Manager Privilege Escalation VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53138Windows Routing and Remote Access Service (RRAS) information disclosure vulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-53137Windows Accessibility Driver Privilege Escalation Vulnerability for WinSockImportant
Windows NT OS KernelCVE-2025-53136NT OS Kernel Information Leakage VulnerabilityImportant
Windows DirectXCVE-2025-53135DirectX Graphics Kernel Privilege Escalation VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-53134Windows Accessibility Driver Privilege Escalation Vulnerability for WinSockImportant
Windows PrintWorkflowUserSvcCVE-2025-53133Windows PrintWorkflowUserSvc Privilege Escalation VulnerabilityImportant
Windows Win32K – GRFXCVE-2025-53132Win32k Privilege Escalation VulnerabilityImportant
Windows MediaCVE-2025-53131Windows Media remote code execution vulnerabilityImportant
Windows InstallerCVE-2025-50173Windows Installer Privilege Escalation VulnerabilityImportant
Windows DirectXCVE-2025-50172DirectX Graphics Kernel Denial of Service VulnerabilityImportant
Remote Desktop ServerCVE-2025-50171Remote desktop spoofing vulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-50170Windows Cloud Files Mini Filter Driver Privilege Escalation VulnerabilityImportant
Windows SMBCVE-2025-50169Windows SMB Remote Code Execution VulnerabilityImportant
Windows Win32K – ICOMPCVE-2025-50168Win32k Privilege Escalation VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-50167Windows Hyper-V Privilege Escalation VulnerabilityImportant
Windows Distributed Transaction CoordinatorCVE-2025-50166Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-50164Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-50163Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-50162Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
Windows Win32K – GRFXCVE-2025-50161Win32k Privilege Escalation VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-50160Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
Remote Access Point-to-Point Protocol (PPP) EAP-TLSCVE-2025-50159Remote Access Point-to-Point Protocol (PPP) EAP-TLS Privilege Escalation VulnerabilityImportant
Windows NTFSCVE-2025-50158Windows NTFS Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-50156Windows Routing and Remote Access Service (RRAS) information disclosure vulnerabilityImportant
Windows File ExplorerCVE-2025-50154Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Desktop Windows ManagerCVE-2025-50153Desktop window manager privilege escalation vulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-49762Windows Accessibility Driver Privilege Escalation Vulnerability for WinSockImportant
Windows KernelCVE-2025-49761Windows Kernel Privilege Escalation VulnerabilityImportant
SQL ServerCVE-2025-49759Microsoft SQL Server Privilege Escalation VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-49757Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-49743Windows Graphics Component Privilege Escalation VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-25007Microsoft Exchange Server spoofing vulnerabilityImportant
Microsoft Exchange ServerCVE-2025-25006Microsoft Exchange Server spoofing vulnerabilityImportant
Microsoft Exchange ServerCVE-2025-25005Microsoft Exchange Server Tampering VulnerabilityImportant
GitHub Copilot and Visual StudioCVE-2025-53773GitHub Copilot and Visual Studio remote code execution vulnerabilitiesImportant
Web DeployCVE-2025-53772Web deployment remote code execution vulnerabilityImportant
SQL ServerCVE-2025-24999Microsoft SQL Server Privilege Escalation VulnerabilityImportant
Microsoft Office PowerPointCVE-2025-53761Microsoft PowerPoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-53760Microsoft SharePoint Privilege Escalation VulnerabilityImportant
Microsoft Office ExcelCVE-2025-53759Microsoft Excel remote code execution vulnerabilityImportant
Microsoft Office ExcelCVE-2025-53741Microsoft Excel remote code execution vulnerabilityImportant
Microsoft Office VisioCVE-2025-53730Microsoft Office Visio Remote Code Execution VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-33051Microsoft Exchange Server Information Disclosure VulnerabilityImportant
Azure File SyncCVE-2025-53729Microsoft Azure File Sync Privilege Escalation VulnerabilityImportant
SQL ServerCVE-2025-53727Microsoft SQL Server Privilege Escalation VulnerabilityImportant
SQL ServerCVE-2025-49758Microsoft SQL Server Privilege Escalation VulnerabilityImportant
Microsoft Dynamics 365 (on-premises)CVE-2025-49745Microsoft Dynamics 365 (local) cross-site scripting vulnerabilityImportant
Role: Windows Hyper-VCVE-2025-49751Windows Hyper-V Denial of Service VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-53786Microsoft Exchange Server Mixed Deployment Privilege Escalation VulnerabilityImportant
Microsoft Edge for AndroidCVE-2025-49736Microsoft Edge for Android (based on Chromium) spoofing vulnerabilityModerate
Windows KerberosCVE-2025-53779Windows Kerberos Privilege Escalation VulnerabilityModerate
Microsoft Edge for AndroidCVE-2025-49755Microsoft Edge for Android (based on Chromium) spoofing vulnerabilityLow

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.

Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.

Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.