Overview
On October 15, NSFOCUS CERT detected that Microsoft released the October Security Update patch, fixing 175 security issues involving widely used products such as Windows, Microsoft Office, Azure, Apps, Microsoft Exchange Server, and Microsoft Visual Studio. These include high-risk vulnerability types such as privilege escalation and remote code execution.
Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 15 critical vulnerabilities, 158 important vulnerabilities, and 2 moderate vulnerabilities. These include 3 0day vulnerabilities:
- Windows Agere Modem Driver Privilege Escalation Vulnerability (CVE-2025-24990)
- Windows Remote Access Connection Manager Privilege Escalation Vulnerability (CVE-2025-59230)
- Windows Agere Modem Driver Privilege Escalation Vulnerability (CVE-2025-24052)
Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.
Reference link: https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-Oct
Key Vulnerabilities
Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:
Windows Agere Modem Driver Privilege Escalation Vulnerability (CVE-2025-24052/CVE-2025-24990):
A buffer overflow vulnerability exists in the Windows Agere Modem Driver, which allows an authenticated local attacker to manipulate memory in kernel mode and elevate to system administrator privileges due to insufficient user-mode pointer validation of the Agere modem driver (ltmdm64.sys). The CVSS score is 7.8, of which CVE-2025-24990 has been used in the wild.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24052
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24990
Windows Remote Access Connection Manager Privilege Escalation Vulnerability (CVE-2025-59230):
There is a privilege escalation vulnerability in Windows Remote Access Connection Manager. Due to improper access control of the system, an authenticated local attacker can elevate privileges to SYSTEM. The vulnerability has been exploited in the wild, with a CVSS score of 7.8.
Official announcement link: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230
Windows Server Update Services Remote Code Execution Vulnerability (CVE-2025-59287):
A remote code execution vulnerability exists in Windows Server Update Services. Due to the deserialization problem of WSUS, an unauthenticated attacker can deserialize untrusted data by sending specially crafted events to execute arbitrary code on the target server. CVSS score 9.8.
Official announcement link: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287
Microsoft Office Remote Code Execution Vulnerability (CVE-2025-59227):
There is a remote code execution vulnerability in Microsoft Office. Due to the use-after-free reuse problem when processing specially crafted documents, attackers can trick users into opening or previewing panes by making malicious files, thereby executing arbitrary code in the user’s context. CVSS score 7.8.
Official announcement link: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59227
Microsoft Excel Remote Code Execution Vulnerability (CVE-2025-59236):
A remote code execution vulnerability exists in Microsoft Excel, which allows an unauthenticated attacker to execute arbitrary code on the victim’s host by crafting a malicious file that tricks a user into opening it due to a use-after-free flaw in Excel. CVSS score 8.4.
Official announcement link: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59236
Azure Entra ID Privilege Escalation Vulnerability (CVE-2025-59246):
There is a privilege escalation vulnerability in Azure Entra ID. Due to the authentication defects of Azure Entra ID in some service interfaces, attackers can obtain higher than assigned role permissions in the target tenant under certain conditions, thereby performing sensitive operations such as creating/modifying users, changing applications or configurations. CVSS score 9.8.
Official announcement link: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59246
Microsoft Exchange Server Privilege Escalation Vulnerability (CVE-2025-59249):
There is a privilege escalation vulnerability in Microsoft Exchange Server. Due to the weak authentication mechanism of Exchange Server, an attacker with ordinary user privileges can elevate system privileges through the network. CVSS score 8.8.
Official announcement link: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59249
Windows Remote Desktop Client Remote Code Execution Vulnerability (CVE-2025-58718):
A remote code execution vulnerability exists in the Windows Remote Desktop Client. Due to a use-after-free memory error in the remote desktop client, an unauthenticated attacker can trigger remote code execution through a specially crafted network request. CVSS score 8.8.
Official announcement link: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-58718
Scope of Impact
The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.
| Vulnerability Number | Affected product versions |
| CVE-2025-24052 CVE-2025-24990 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 for x64-based Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) Windows 11 Version 23H2 for x64-based Systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for x64-based Systems Windows 11 Version 25H2 for x64-based Systems |
| CVE-2025-59230 | Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 25H2 for x64-based Systems Windows 11 Version 25H2 for ARM64-based Systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 |
| CVE-2025-59287 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2025 (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 |
| CVE-2025-59227 | Microsoft Office for Android Microsoft Office LTSC for Mac 2021 Microsoft Office 2016 (32-bit edition) Microsoft Office LTSC for Mac 2024 Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft Office LTSC 2024 for 64-bit editions Microsoft Office LTSC 2024 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for 32-bit editions Microsoft Office 2016 (64-bit edition) |
| CVE-2025-59236 | Microsoft Office LTSC for Mac 2024 Microsoft Office LTSC 2024 for 64-bit editions Microsoft Office LTSC 2024 for 32-bit editions Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC for Mac 2021 Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for 32-bit editions Office Online Server |
| CVE-2025-59246 | Microsoft Entra ID |
| CVE-2025-59249 | Microsoft Exchange Server Subscription Edition RTM Microsoft Exchange Server 2019 Cumulative Update 15 Microsoft Exchange Server 2019 Cumulative Update 14 Microsoft Exchange Server 2016 Cumulative Update 23 |
| CVE-2025-58718 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Remote Desktop client for Windows Desktop Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 11 Version 25H2 for ARM64-based Systems Windows 11 Version 25H2 for x64-based Systems Windows App Client for Windows Desktop |
Mitigation
At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link:
https://msrc.microsoft.com/update-guide/releaseNote/2025-Oct
Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.
Right-click the Windows icon, select “Settings (N)”, select “Update and Security”-“Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.
For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.
Appendix: Vulnerability List
| Affected products | CVE No. | Vulnerability Title | Severity |
|---|---|---|---|
| Microsoft Office | CVE-2025-59234 | Microsoft Office Remote Code Execution Vulnerability | Critical |
| Microsoft Office | CVE-2025-59236 | Microsoft Excel remote code execution vulnerability | Critical |
| Windows | CVE-2025-49708 | Microsoft Graphics Component Privilege Escalation Vulnerability | Critical |
| Azure | CVE-2025-59291 | Confidential Azure Container Instances Privilege Escalation Vulnerability | Critical |
| Azure | CVE-2025-59292 | Azure Compute Gallery Privilege Escalation Vulnerability | Critical |
| Microsoft Office | CVE-2025-59227 | Microsoft Office Remote Code Execution Vulnerability | Critical |
| Windows | CVE-2025-59287 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability | Critical |
| Azure | CVE-2025-59218 | Azure Entra ID privilege escalation vulnerability | Critical |
| Azure | CVE-2025-59246 | Azure Entra ID privilege escalation vulnerability | Critical |
| Azure | CVE-2025-59247 | Azure PlayFab privilege escalation vulnerability | Critical |
| Apps | CVE-2025-59252 | M365 Copilot spoofing vulnerability | Critical |
| Azure | CVE-2025-59271 | Redis Enterprise Privilege Escalation Vulnerability | Critical |
| Apps | CVE-2025-59272 | Copilot spoofing vulnerability | Critical |
| Azure | CVE-2025-55321 | Azure Monitor Log Analytics Spoofing Vulnerability | Critical |
| Apps | CVE-2025-59286 | Copilot spoofing vulnerability | Critical |
| Azure | CVE-2025-47989 | Azure Connected Machine Agent Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-48004 | Microsoft Brokering File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-50174 | Windows Device Association Broker Service Privilege Escalation Vulnerability | Important |
| Microsoft Exchange Server Microsoft Exchange Server Subscription Edition RTM | CVE-2025-53782 | Microsoft Exchange Server Privilege Escalation Vulnerability | Important |
| .NET 8.0 installed on Linux,.NET 9.0 installed on Linux | CVE-2025-55247 | .NET privilege escalation vulnerability | Important |
| Windows | CVE-2025-24990 | Windows Agere Modem Driver Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-24052 | Windows Agere Modem Driver Privilege Escalation Vulnerability | Important |
| System Center | CVE-2025-55320 | Configuration Manager privilege escalation vulnerability | Important |
| Windows | CVE-2025-55325 | Windows Storage Management Provider Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-55333 | Windows BitLocker security feature bypass vulnerability | Important |
| Windows | CVE-2025-55335 | Windows NTFS Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55336 | Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-55338 | Windows BitLocker security feature bypass vulnerability | Important |
| Windows | CVE-2025-55339 | Windows Network Driver Interface Specification Driver Escalation Vulnerability | Important |
| Windows | CVE-2025-55340 | Windows Remote Desktop Protocol Security Feature Bypass | Important |
| Windows | CVE-2025-55676 | Windows USB Video Class System Driver Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-55677 | Windows Device Association Broker Service Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55681 | Desktop Windows Manager Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55685 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55686 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55687 | Windows Resilient File System (ReFS) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55689 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55700 | Windows Routing and Remote Access Service (RRAS) Disclosure Vulnerability | Important |
| Windows | CVE-2025-55701 | Windows Authentication privilege escalation vulnerability | Important |
| Windows | CVE-2025-58715 | Windows Speech Runtime Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-58716 | Windows Speech Runtime Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-58717 | Windows Routing and Remote Access Service (RRAS) Disclosure Vulnerability | Important |
| Windows | CVE-2025-58719 | Windows Connected Devices Platform Service privilege escalation vulnerability | Important |
| Windows | CVE-2025-58722 | Microsoft DWM Core Library Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-58728 | Windows Bluetooth Service Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-58732 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-58735 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-59185 | NTLM Hash Disclosure spoofing vulnerability | Important |
| Windows | CVE-2025-59186 | Windows Kernel Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-59195 | Microsoft Graphics Component Denial of Service Vulnerability | Important |
| Windows | CVE-2025-59196 | Windows Simple Search and Discovery Protocol (SSDP) Service Escalation Vulnerability | Important |
| Windows | CVE-2025-59199 | Software Protection Platform (SPP) Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59200 | Data Sharing Service Spoofing Vulnerability | Important |
| Windows | CVE-2025-59201 | Network Connection Status Indicator (NCSI) privilege escalation vulnerability | Important |
| Windows | CVE-2025-59202 | Windows Remote Desktop Services Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59204 | Windows Management Services Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-59206 | Windows Resilient File System (ReFS) Deduplication Service Escalation Vulnerability | Important |
| Windows | CVE-2025-59207 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2025-59211 | Windows Push Notification information disclosure vulnerability | Important |
| Microsoft Office | CVE-2025-59228 | Microsoft SharePoint Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2025-59231 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office | CVE-2025-59233 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office | CVE-2025-59235 | Microsoft Excel Information Disclosure Vulnerability | Important |
| Microsoft Office | CVE-2025-59237 | Microsoft SharePoint Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-59242 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Microsoft Office | CVE-2025-59243 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Exchange Server Microsoft Exchange Server Subscription Edition RTM | CVE-2025-59249 | Microsoft Exchange Server Privilege Escalation Vulnerability | Important |
| Microsoft JDBC Driver 12.4 for SQL Server Microsoft JDBC Driver 13.2 for SQL Server Microsoft JDBC Driver 12.2 for SQL Server Microsoft JDBC Driver 11.2 for SQL Server Microsoft JDBC Driver 12.8 for SQL Server Microsoft JDBC Driver 10.2 for SQL Server Microsoft JDBC Driver 12.6 for SQL Server Microsoft JDBC Driver 12.10 for SQL Server | CVE-2025-59250 | JDBC Driver for SQL Server spoofing vulnerability | Important |
| Windows | CVE-2025-59254 | Microsoft DWM Core Library Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59255 | Windows DWM Core Library Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-54957 | MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder | Important |
| Windows | CVE-2025-59257 | Windows Local Session Manager (LSM) Denial of Service | Important |
| Windows | CVE-2025-59258 | Windows Active Directory Federation Services (ADFS) disclosure vulnerability | Important |
| Windows | CVE-2025-59259 | Windows Local Session Manager (LSM) Denial of Service | Important |
| Windows | CVE-2025-59277 | Windows Authentication privilege escalation vulnerability | Important |
| Windows | CVE-2025-59280 | Windows SMB Client Tampering Vulnerability | Important |
| Windows | CVE-2025-47979 | Microsoft Failover Cluster information disclosure vulnerability | Important |
| Apps | CVE-2025-59281 | Xbox Gaming Services Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59282 | Internet Information Services (IIS) Inbox COM Objects (Global Memory) remote code execution vulnerability | Important |
| Windows | CVE-2025-59284 | Windows NTLM spoofing vulnerability | Important |
| Windows | CVE-2025-59290 | Windows Bluetooth Service Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59294 | Windows Taskbar Live Preview information disclosure vulnerability | Important |
| Windows | CVE-2025-59295 | Windows URL Parsing Remote Code Execution Vulnerability | Important |
| Azure | CVE-2025-59494 | Azure Monitor Agent privilege escalation vulnerability | Important |
| Windows | CVE-2025-48813 | Virtual Secure Mode Spoofing Vulnerability | Important |
| Windows PowerShell | CVE-2025-25004 | PowerShell privilege escalation vulnerability | Important |
| Windows | CVE-2025-53717 | Windows Virtualization-Based Security (VBS) Enclave Escalation Vulnerability | Important |
| Windows | CVE-2025-50152 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2025-53150 | Windows Digital Media Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-50175 | Windows Digital Media Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-53139 | Windows Hello security feature bypass vulnerability | Important |
| Windows | CVE-2025-53768 | Xbox IStorageService Privilege Escalation Vulnerability | Important |
| Microsoft Visual Studio | CVE-2025-55240 | Visual Studio Privilege Escalation Vulnerability | Important |
| .NET 8.0 installed on Linux .NET 9.0 installed on Linux,Microsoft .NET Framework .NET 9.0 installed on Windows .NET 8.0 installed on Windows .NET 8.0 installed on Mac OS Microsoft Visual Studio .NET 9.0 installed on Mac OS | CVE-2025-55248 | .NET, .NET Framework, and Visual Studio disclosure vulnerabilities | Important |
| Windows | CVE-2025-55326 | Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-55328 | Windows Hyper-V Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55330 | Windows BitLocker security feature bypass vulnerability | Important |
| Windows | CVE-2025-55331 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55332 | Windows BitLocker security feature bypass vulnerability | Important |
| Windows | CVE-2025-55334 | Windows Kernel security feature bypass vulnerability | Important |
| Windows | CVE-2025-55337 | Windows BitLocker security feature bypass vulnerability | Important |
| Windows | CVE-2025-55678 | DirectX Graphics Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2025-55679 | Windows Kernel Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-55680 | Windows Cloud Files Mini Filter Driver privilege escalation vulnerability | Important |
| Windows | CVE-2025-55682 | Windows BitLocker security feature bypass vulnerability | Important |
| Windows | CVE-2025-55683 | Windows Kernel Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-55684 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55688 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55690 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55691 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55692 | Windows Error Reporting Service Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55693 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2025-55694 | Windows Error Reporting Service Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-55695 | Windows WLAN AutoConfig Service Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-55696 | NtQueryInformation Token function (ntifs.h) privilege escalation vulnerability | Important |
| Windows | CVE-2025-55697 | Azure Local privilege escalation vulnerability | Important |
| Windows | CVE-2025-55698 | DirectX Graphics Kernel denial of service vulnerability | Important |
| Windows | CVE-2025-55699 | Windows Kernel Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-58714 | Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-58718 | Remote Desktop Client remote code execution vulnerability | Important |
| Windows | CVE-2025-58720 | Windows Cryptographic Services Information Disclosure Vulnerability | Important |
| Azure | CVE-2025-58724 | Arc Enabled Servers-Azure Connected Machine Agent privilege escalation vulnerability | Important |
| Windows | CVE-2025-58725 | Windows COM+ Event System Service Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-58726 | Windows SMB Server Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-58727 | Windows Connected Devices Platform Service privilege escalation vulnerability | Important |
| Windows | CVE-2025-58729 | Windows Local Session Manager (LSM) Denial of Service | Important |
| Windows | CVE-2025-58730 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-58731 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-58733 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-58734 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-58736 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-58737 | Remote Desktop Protocol remote code execution vulnerability | Important |
| Windows | CVE-2025-58738 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-58739 | Microsoft Windows File Explorer Spoofing Vulnerability | Important |
| Windows | CVE-2025-59184 | Storage Spaces Direct Vulnerability | Important |
| Windows | CVE-2025-59187 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2025-59188 | Microsoft Failover Cluster information disclosure vulnerability | Important |
| Windows | CVE-2025-59189 | Microsoft Brokering File System Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59190 | Windows Search Service Denial of Service Vulnerability | Important |
| Windows | CVE-2025-59191 | Windows Connected Devices Platform Service privilege escalation vulnerability | Important |
| Windows | CVE-2025-59192 | Storport.sys Driver privilege escalation vulnerability | Important |
| Windows | CVE-2025-59193 | Windows Management Services Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59194 | Windows Kernel privilege escalation vulnerability | Important |
| Windows | CVE-2025-59197 | Windows ETL Channel Information Disclosure Vulnerability | Important |
| Windows | CVE-2025-59198 | Windows Search Service Denial of Service Vulnerability | Important |
| Windows | CVE-2025-59203 | Windows State Repository API Server File information disclosure vulnerability | Important |
| Windows | CVE-2025-59205 | Windows Graphics Component Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59208 | Windows MapUrlToZone information disclosure vulnerability | Important |
| Windows | CVE-2025-59209 | Windows Push Notification information disclosure vulnerability | Important |
| Windows | CVE-2025-59210 | Windows Resilient File System (ReFS) Deduplication Service Escalation Vulnerability | Important |
| System Center | CVE-2025-59213 | Configuration Manager privilege escalation vulnerability | Important |
| Microsoft Office | CVE-2025-59221 | Microsoft Word Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2025-59222 | Microsoft Word Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2025-59223 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office | CVE-2025-59224 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office | CVE-2025-59225 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office | CVE-2025-59226 | Microsoft Office Visio Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2025-59229 | Microsoft Office Denial of Service Vulnerability | Important |
| Microsoft Office | CVE-2025-59232 | Microsoft Excel Information Disclosure Vulnerability | Important |
| Microsoft Office | CVE-2025-59238 | Microsoft PowerPoint Remote Code Execution Vulnerability | Important |
| Windows | CVE-2025-59241 | Windows Health and Optimized Experiences privilege escalation vulnerability | Important |
| Windows | CVE-2025-59244 | NTLM Hash Disclosure spoofing vulnerability | Important |
| Microsoft Exchange Server Microsoft Exchange Server Subscription Edition RTM | CVE-2025-59248 | Microsoft Exchange Server spoofing vulnerability | Important |
| Windows | CVE-2025-59230 | Windows Remote Access Connection Manager Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59253 | Windows Search Service Denial of Service Vulnerability | Important |
| Windows | CVE-2025-59260 | Microsoft Failover Cluster Virtual Driver Disclosure Vulnerability | Important |
| Windows | CVE-2025-59261 | Windows Graphics Component Privilege Escalation Vulnerability | Important |
| Windows | CVE-2025-59275 | Windows Authentication privilege escalation vulnerability | Important |
| Windows | CVE-2025-59278 | Windows Authentication privilege escalation vulnerability | Important |
| Azure | CVE-2025-59285 | Azure Monitor Agent privilege escalation vulnerability | Important |
| Windows | CVE-2025-59289 | Windows Bluetooth Service Privilege Escalation Vulnerability | Important |
| System Center | CVE-2025-59497 | Microsoft Defender for Linux Denial of Service Vulnerability | Important |
| Windows | CVE-2025-59214 | Microsoft Windows File Explorer Spoofing Vulnerability | Important |
| Microsoft Visual Studio,ASP.NET Core | CVE-2025-55315 | ASP.NET Security Function Bypass Vulnerability | Important |
| Windows | CVE-2025-59502 | Remote Procedure Call denial of service vulnerability | Moderate |
Statement
This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.
About NSFOCUS
NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.
Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.
Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.