Overview
On August 13, NSFOCUS CERT detected that Microsoft released the August Security Update patch, which fixed 111 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Visual Studio, and Microsoft Exchange Server. These include high-risk vulnerability types such as privilege escalation and remote code execution.
Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 17 critical vulnerabilities, 91 important vulnerabilities, and 2 moderate vulnerabilities.
Users should update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.
Reference link: https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-Aug
Key Vulnerabilities
Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention to:
Windows Graphics Component Remote Code Execution Vulnerability (CVE-2025-50165):
A remote code execution vulnerability exists in the Windows Graphics Component, which allows an unauthenticated attacker to remotely execute code on the target system through a specially crafted JPEG image (which can be embedded in Office or other files) due to untrusted pointer dereferences in Microsoft Graphics Component. CVSS score is 9.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-50165
Windows GDI Remote Code Execution Vulnerability (CVE-2025-53766):
A remote code execution vulnerability exists in Windows GDI. Due to a heap-based buffer overflow in Windows GDI+, an unauthenticated attacker can execute arbitrary code by tricking the user into downloading and opening a document containing a specially crafted metafile. CVSS score is 9.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-53766
Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2025-49712):
A remote code execution vulnerability exists in Microsoft SharePoint, which allows an authenticated remote attacker to execute arbitrary code due to the deserialization of untrusted data in Microsoft Office SharePoint. CVSS score is 8.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-49712
Microsoft Word Remote Code Execution Vulnerability (CVE-2025-53733):
A remote code execution vulnerability exists in Microsoft Word. Due to improper number type conversion in Microsoft Office Word, an unauthenticated attacker can execute arbitrary code in the user’s context by crafting a malicious file that tricks the user into opening or previewing a pane. CVSS score is 8.4.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-53733
Windows NTLM Privilege Escalation Vulnerability (CVE-2025-53778):
A privilege escalation vulnerability exists in Windows NTLM, which can be exploited by an authenticated local attacker to gain system SYSTEM privileges due to improper authentication in Windows NTLM. CVSS score is 8.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-53778
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability (CVE-2025-50177):
A remote code execution vulnerability exists in Microsoft Message Queues (MSMQ). Due to the Use-After-Free nature of Windows message queues, an unauthenticated attacker can achieve remote code execution on the target server by sending a batch of specially crafted HTTP packets to the MSMQ server for race conditions.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-50177
Microsoft SQL Server Privilege Escalation Vulnerability (CVE-2025-24999):
There is a privilege escalation vulnerability in Microsoft SQL Server. Due to improper access control of SQL Server, an authenticated attacker can obtain sysadmin permissions on the target system through the network. CVSS score is 8.8.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24999
Azure Portal Privilege Escalation Vulnerability (CVE-2025-53792):
There is a privilege escalation vulnerability in the Azure portal. Due to improper authorization in the Azure Windows virtual machine agent, an unauthenticated attacker can escalate privileges through the network. CVSS score is 9.1.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-53792
Remote Desktop Spoofing Vulnerability (CVE-2025-50171):
There is a spoofing vulnerability in Remote Desktop. Due to the lack of authorization from the remote desktop server, an unauthenticated attacker can perform spoofing attacks on the network. CVSS score is 9.1.
Official announcement link:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-50171
Scope of Impact
The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.
| Vulnerability Number | Affected product versions |
| CVE-2025-50165 | Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2025 (Server Core installation) |
| CVE-2025-53766 | Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems |
| CVE-2025-49712 | Microsoft SharePoint Server 2019 Microsoft SharePoint Enterprise Server 2016 |
| CVE-2025-53733 | Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for 32-bit editions Microsoft SharePoint Server 2019 Microsoft SharePoint Enterprise Server 2016 Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC for Mac 2021 Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft 365 Apps for Enterprise for 32-bit Systems Microsoft Word 2016 (64-bit edition) Microsoft Word 2016 (32-bit edition) Microsoft Office LTSC for Mac 2024 Microsoft Office LTSC 2024 for 64-bit editions Microsoft Office LTSC 2024 for 32-bit editions Microsoft Office LTSC 2021 for 32-bit editions |
| CVE-2025-53778 | Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows Server 2025 (Server Core installation) Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) |
| CVE-2025-50177 | Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems Windows Server 2025 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation) |
| CVE-2025-24999 | Microsoft SQL Server 2022 for x64-based Systems (CU 20) Microsoft SQL Server 2019 for x64-based Systems (CU 32) Microsoft SQL Server 2022 for x64-based Systems (GDR) Microsoft SQL Server 2017 for x64-based Systems (CU 31) Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) Microsoft SQL Server 2019 for x64-based Systems (GDR) Microsoft SQL Server 2017 for x64-based Systems (GDR) |
| CVE-2025-53792 | Azure Portal |
| CVE-2025-50171 | Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2025 (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 |
Mitigation
Patch update
At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link: https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-Aug
Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.
Right-click the Windows icon, select “Settings (N)”, select “Update and Security”- “Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.
For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update Catalog” website to download the independent program package and install it.
Appendix: Vulnerability List
| Affected products | CVE No. | Vulnerability Title | Severity |
| Microsoft 365 Copilot’s Business Chat | CVE-2025-53787 | Microsoft 365 Copilot BizChat Information Disclosure Vulnerability | Critical |
| Microsoft 365 Copilot’s Business Chat | CVE-2025-53774 | Microsoft 365 Copilot BizChat Information Disclosure Vulnerability | Critical |
| Azure Portal | CVE-2025-53792 | Azure portal privilege escalation vulnerability | Critical |
| Azure OpenAI | CVE-2025-53767 | Azure OpenAI Privilege Escalation Vulnerability | Critical |
| Azure Virtual Machines | CVE-2025-49707 | Azure Virtual Machines Spoofing Vulnerability | Critical |
| Role: Windows Hyper-V | CVE-2025-48807 | Windows Hyper-V Remote Code Execution Vulnerability | Critical |
| Azure Stack | CVE-2025-53793 | Azure Stack Hub Information Disclosure Vulnerability | Critical |
| Microsoft Office Word | CVE-2025-53784 | Microsoft Word Remote Code Execution Vulnerability | Critical |
| Windows NTLM | CVE-2025-53778 | Windows NTLM Privilege Escalation Vulnerability | Critical |
| Windows GDI+ | CVE-2025-53766 | GDI remote code execution vulnerability | Critical |
| Microsoft Office | CVE-2025-53740 | Microsoft Office Remote Code Execution Vulnerability | Critical |
| Microsoft Office Word | CVE-2025-53733 | Microsoft Word Remote Code Execution Vulnerability | Critical |
| Microsoft Office | CVE-2025-53731 | Microsoft Office Remote Code Execution Vulnerability | Critical |
| Windows Message Queuing | CVE-2025-50177 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Critical |
| Graphics Kernel | CVE-2025-50176 | DirectX graphics kernel remote code execution vulnerability | Critical |
| Microsoft Graphics Component | CVE-2025-50165 | Windows Graphics Component Remote Code Execution Vulnerability | Critical |
| Azure Virtual Machines | CVE-2025-53781 | Azure Virtual Machines Information Disclosure Vulnerability | Critical |
| Microsoft Office SharePoint | CVE-2025-49712 | Microsoft SharePoint Remote Code Execution Vulnerability | Important |
| Windows StateRepository API | CVE-2025-53789 | Windows StateRepository API Server File Privilege Escalation Vulnerability | Important |
| Windows Subsystem for Linux | CVE-2025-53788 | Windows Subsystem for Linux (WSL2) Kernel Privilege Escalation Vulnerability | Important |
| Microsoft Teams | CVE-2025-53783 | Microsoft Teams Remote Code Execution Vulnerability | Important |
| Windows Push Notifications | CVE-2025-50155 | Privilege escalation vulnerability in Windows push notification application | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-50157 | Windows Routing and Remote Access Service (RRAS) information disclosure vulnerability | Important |
| Windows Security App | CVE-2025-53769 | Windows Security Application Spoofing Vulnerability | Important |
| Azure Stack | CVE-2025-53765 | Azure Stack Hub Information Disclosure Vulnerability | Important |
| Microsoft Office Excel | CVE-2025-53739 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office Word | CVE-2025-53738 | Microsoft Word Remote Code Execution Vulnerability | Important |
| Microsoft Office Excel | CVE-2025-53737 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office Word | CVE-2025-53736 | Microsoft Word Information Disclosure Vulnerability | Important |
| Microsoft Office Excel | CVE-2025-53735 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office Visio | CVE-2025-53734 | Microsoft Office Visio Remote Code Execution Vulnerability | Important |
| Microsoft Office | CVE-2025-53732 | Microsoft Office Remote Code Execution Vulnerability | Important |
| SQL Server | CVE-2025-47954 | Microsoft SQL Server Privilege Escalation Vulnerability | Important |
| Microsoft Dynamics 365 (on-premises) | CVE-2025-53728 | Microsoft Dynamics 365 (Local) Information Disclosure Vulnerability | Important |
| Windows Push Notifications | CVE-2025-53726 | Privilege escalation vulnerability in Windows push notification application | Important |
| Windows Push Notifications | CVE-2025-53725 | Privilege escalation vulnerability in Windows push notification application | Important |
| Windows Push Notifications | CVE-2025-53724 | Privilege escalation vulnerability in Windows push notification application | Important |
| Role: Windows Hyper-V | CVE-2025-53723 | Windows Hyper-V Privilege Escalation Vulnerability | Important |
| Windows Remote Desktop Services | CVE-2025-53722 | Windows Remote Desktop Services Denial of Service Vulnerability | Important |
| Windows Connected Devices Platform Service | CVE-2025-53721 | Windows Connected Device Platform Service Privilege Escalation Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-53720 | Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-53719 | Windows Routing and Remote Access Service (RRAS) information disclosure vulnerability | Important |
| Windows Ancillary Function Driver for WinSock | CVE-2025-53718 | Windows Accessibility Driver Privilege Escalation Vulnerability for WinSock | Important |
| Windows Local Security Authority Subsystem Service (LSASS) | CVE-2025-53716 | Local Security Authentication Subsystem Service (LSASS) Denial of service vulnerability | Important |
| Storage Port Driver | CVE-2025-53156 | Windows Storage Port Driver Information Disclosure Vulnerability | Important |
| Role: Windows Hyper-V | CVE-2025-53155 | Windows Hyper-V Privilege Escalation Vulnerability | Important |
| Windows Ancillary Function Driver for WinSock | CVE-2025-53154 | Windows Accessibility Driver Privilege Escalation Vulnerability for WinSock | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-53153 | Windows Routing and Remote Access Service (RRAS) information disclosure vulnerability | Important |
| Desktop Windows Manager | CVE-2025-53152 | Desktop Window Manager Remote Code Execution Vulnerability | Important |
| Windows Kernel | CVE-2025-53151 | Windows Kernel Privilege Escalation Vulnerability | Important |
| Kernel Streaming WOW Thunk Service Driver | CVE-2025-53149 | Kernel Streaming WOW Thunk service driver privilege escalation vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-53148 | Windows Routing and Remote Access Service (RRAS) information disclosure vulnerability | Important |
| Windows Ancillary Function Driver for WinSock | CVE-2025-53147 | Windows Accessibility Driver Privilege Escalation Vulnerability for WinSock | Important |
| Windows Message Queuing | CVE-2025-53145 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Important |
| Windows Message Queuing | CVE-2025-53144 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Important |
| Windows Message Queuing | CVE-2025-53143 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | Important |
| Microsoft Brokering File System | CVE-2025-53142 | Microsoft proxy file system privilege escalation vulnerability | Important |
| Windows Ancillary Function Driver for WinSock | CVE-2025-53141 | Windows Accessibility Driver Privilege Escalation Vulnerability for WinSock | Important |
| Kernel Transaction Manager | CVE-2025-53140 | Windows Kernel Transaction Manager Privilege Escalation Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-53138 | Windows Routing and Remote Access Service (RRAS) information disclosure vulnerability | Important |
| Windows Ancillary Function Driver for WinSock | CVE-2025-53137 | Windows Accessibility Driver Privilege Escalation Vulnerability for WinSock | Important |
| Windows NT OS Kernel | CVE-2025-53136 | NT OS Kernel Information Leakage Vulnerability | Important |
| Windows DirectX | CVE-2025-53135 | DirectX Graphics Kernel Privilege Escalation Vulnerability | Important |
| Windows Ancillary Function Driver for WinSock | CVE-2025-53134 | Windows Accessibility Driver Privilege Escalation Vulnerability for WinSock | Important |
| Windows PrintWorkflowUserSvc | CVE-2025-53133 | Windows PrintWorkflowUserSvc Privilege Escalation Vulnerability | Important |
| Windows Win32K – GRFX | CVE-2025-53132 | Win32k Privilege Escalation Vulnerability | Important |
| Windows Media | CVE-2025-53131 | Windows Media remote code execution vulnerability | Important |
| Windows Installer | CVE-2025-50173 | Windows Installer Privilege Escalation Vulnerability | Important |
| Windows DirectX | CVE-2025-50172 | DirectX Graphics Kernel Denial of Service Vulnerability | Important |
| Remote Desktop Server | CVE-2025-50171 | Remote desktop spoofing vulnerability | Important |
| Windows Cloud Files Mini Filter Driver | CVE-2025-50170 | Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability | Important |
| Windows SMB | CVE-2025-50169 | Windows SMB Remote Code Execution Vulnerability | Important |
| Windows Win32K – ICOMP | CVE-2025-50168 | Win32k Privilege Escalation Vulnerability | Important |
| Role: Windows Hyper-V | CVE-2025-50167 | Windows Hyper-V Privilege Escalation Vulnerability | Important |
| Windows Distributed Transaction Coordinator | CVE-2025-50166 | Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-50164 | Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-50163 | Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-50162 | Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability | Important |
| Windows Win32K – GRFX | CVE-2025-50161 | Win32k Privilege Escalation Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-50160 | Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability | Important |
| Remote Access Point-to-Point Protocol (PPP) EAP-TLS | CVE-2025-50159 | Remote Access Point-to-Point Protocol (PPP) EAP-TLS Privilege Escalation Vulnerability | Important |
| Windows NTFS | CVE-2025-50158 | Windows NTFS Information Disclosure Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-50156 | Windows Routing and Remote Access Service (RRAS) information disclosure vulnerability | Important |
| Windows File Explorer | CVE-2025-50154 | Microsoft Windows File Explorer Spoofing Vulnerability | Important |
| Desktop Windows Manager | CVE-2025-50153 | Desktop window manager privilege escalation vulnerability | Important |
| Windows Ancillary Function Driver for WinSock | CVE-2025-49762 | Windows Accessibility Driver Privilege Escalation Vulnerability for WinSock | Important |
| Windows Kernel | CVE-2025-49761 | Windows Kernel Privilege Escalation Vulnerability | Important |
| SQL Server | CVE-2025-49759 | Microsoft SQL Server Privilege Escalation Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2025-49757 | Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability | Important |
| Microsoft Graphics Component | CVE-2025-49743 | Windows Graphics Component Privilege Escalation Vulnerability | Important |
| Microsoft Exchange Server | CVE-2025-25007 | Microsoft Exchange Server spoofing vulnerability | Important |
| Microsoft Exchange Server | CVE-2025-25006 | Microsoft Exchange Server spoofing vulnerability | Important |
| Microsoft Exchange Server | CVE-2025-25005 | Microsoft Exchange Server Tampering Vulnerability | Important |
| GitHub Copilot and Visual Studio | CVE-2025-53773 | GitHub Copilot and Visual Studio remote code execution vulnerabilities | Important |
| Web Deploy | CVE-2025-53772 | Web deployment remote code execution vulnerability | Important |
| SQL Server | CVE-2025-24999 | Microsoft SQL Server Privilege Escalation Vulnerability | Important |
| Microsoft Office PowerPoint | CVE-2025-53761 | Microsoft PowerPoint Remote Code Execution Vulnerability | Important |
| Microsoft Office SharePoint | CVE-2025-53760 | Microsoft SharePoint Privilege Escalation Vulnerability | Important |
| Microsoft Office Excel | CVE-2025-53759 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office Excel | CVE-2025-53741 | Microsoft Excel remote code execution vulnerability | Important |
| Microsoft Office Visio | CVE-2025-53730 | Microsoft Office Visio Remote Code Execution Vulnerability | Important |
| Microsoft Exchange Server | CVE-2025-33051 | Microsoft Exchange Server Information Disclosure Vulnerability | Important |
| Azure File Sync | CVE-2025-53729 | Microsoft Azure File Sync Privilege Escalation Vulnerability | Important |
| SQL Server | CVE-2025-53727 | Microsoft SQL Server Privilege Escalation Vulnerability | Important |
| SQL Server | CVE-2025-49758 | Microsoft SQL Server Privilege Escalation Vulnerability | Important |
| Microsoft Dynamics 365 (on-premises) | CVE-2025-49745 | Microsoft Dynamics 365 (local) cross-site scripting vulnerability | Important |
| Role: Windows Hyper-V | CVE-2025-49751 | Windows Hyper-V Denial of Service Vulnerability | Important |
| Microsoft Exchange Server | CVE-2025-53786 | Microsoft Exchange Server Mixed Deployment Privilege Escalation Vulnerability | Important |
| Microsoft Edge for Android | CVE-2025-49736 | Microsoft Edge for Android (based on Chromium) spoofing vulnerability | Moderate |
| Windows Kerberos | CVE-2025-53779 | Windows Kerberos Privilege Escalation Vulnerability | Moderate |
| Microsoft Edge for Android | CVE-2025-49755 | Microsoft Edge for Android (based on Chromium) spoofing vulnerability | Low |
Statement
This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.
About NSFOCUS
NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.
Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.
Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.