{"id":34869,"date":"2025-12-11T07:21:35","date_gmt":"2025-12-11T07:21:35","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=32928"},"modified":"2026-04-13T08:49:04","modified_gmt":"2026-04-13T08:49:04","slug":"microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/","title":{"rendered":"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>On December 10, NSFOCUS CERT detected that Microsoft released the December Security Update patch, which fixed 57 security issues involving widely used products such as Windows, Microsoft Office, Microsoft Exchange Server, Azure, etc., including high-risk vulnerability types such as privilege escalation and remote code execution.<\/p>\n\n\n\n<p>Among the vulnerabilities fixed by Microsoft&#8217;s monthly update this month, there are 3 critical vulnerabilities and 53 important (Important) vulnerabilities. These include 3 0day vulnerabilities:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><strong>Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability (CVE-2025-62221)<\/strong><\/p>\n\n\n\n<p><strong>GitHub Copilot for Jetbrains Remote Code Execution Vulnerability (CVE-2025-64671)<\/strong><\/p>\n\n\n\n<p><strong>PowerShell Remote Code Execution Vulnerability (CVE-2025-54100)<\/strong><\/p>\n<\/div><\/div>\n\n\n\n<p>Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.<\/p>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/releaseNote\/2025-Dec\">https:\/\/msrc.microsoft.com\/update-guide\/en-us\/releaseNote\/2025-Dec<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Vulnerabilities<\/h2>\n\n\n\n<p>Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:<\/p>\n\n\n\n<p><strong>Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability (CVE-2025-62221)<\/strong><\/p>\n\n\n\n<p>A privilege escalation vulnerability exists in the Windows Cloud Files Mini Filter Driver, where an authenticated local attacker can elevate privileges to SYSTEM by reusing a use-after-free kernel object through conditional competition because the Windows Cloud Files Mini-Filter Driver does not reset a pointer after releasing a kernel object. The vulnerability has been exploited in the wild, with a CVSS score of 7.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62221\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62221<\/a><\/p>\n\n\n\n<p><strong>Microsoft Office Remote Code Execution Vulnerability (CVE-2025-62554):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Microsoft Office. Due to type confusion when Microsoft Office processes resources, an unauthenticated attacker can send an email containing a malicious link to the user, which will cause remote code execution after the user previews or clicks it. CVSS score 8.4.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62554\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62554<\/a><\/p>\n\n\n\n<p><strong>Microsoft Office Remote Code Execution Vulnerability (CVE-2025-62557):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Microsoft Office. Since Microsoft Office does not clear the pointer (use-after-free) after releasing the object, an unauthenticated attacker can send a malicious link to the user via email to trick the user into opening or previewing the pane, thereby executing arbitrary code on the user&#8217;s computer. CVSS score 8.4.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62557\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62557<\/a><\/p>\n\n\n\n<p><strong>Windows ReFS Remote Code Execution Vulnerability (CVE-2025-62456):<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in Windows ReFS, which can cause a heap buffer overflow when processing shared files on Resilient File System (ReFS) volumes. An authenticated attacker could trigger the heap overflow by writing overly long data to a shared folder, thereby executing arbitrary code on the user&#8217;s computer. CVSS score 8.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62456\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62456<\/a><\/p>\n\n\n\n<p><strong>Microsoft Exchange Server Privilege Escalation Vulnerability (CVE-2025-64666)<\/strong><strong><\/strong><\/p>\n\n\n\n<p>There is a privilege escalation vulnerability in Microsoft Exchange Server. Because the Exchange Server does not fully verify the PowerShell parameters entered by the user, an authenticated attacker can add his account to the &#8220;Organization Management&#8221; administrator group by sending a constructed &#8220;role-parameters&#8221; request on the web version (ECP) or remote PowerShell. CVSS score 7.5.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-64666\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-64666<\/a><\/p>\n\n\n\n<p><strong>Windows Storage VSP Driver Privilege Escalation Vulnerability (CVE-2025-59516)<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A privilege escalation vulnerability exists in the Windows Storage VSP driver. Due to the lack of an authentication mechanism when processing critical functions, an authenticated attacker can write a malicious DLL to the driver and load it by forging a file path, thereby elevating privileges to SYSTEM. CVSS score 7.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-59516\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-59516<\/a><\/p>\n\n\n\n<p><strong>Windows Remote Access Connection Manager Privilege Escalation Vulnerability (CVE-2025-62472)<\/strong><strong><\/strong><\/p>\n\n\n\n<p>A privilege escalation vulnerability exists in the Windows Remote Access Connection Manager, where an authenticated local attacker could trigger a memory error by running a specially crafted program to elevate privileges to SYSTEM because the Windows Remote Access Connection Manager does not clear pointers (use-after-free) when processing uninitialized resources. CVSS score 7.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62472\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62472<\/a><\/p>\n\n\n\n<p><strong>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability (CVE-2025-62549)<\/strong><strong><\/strong><\/p>\n\n\n\n<p>There is a remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS). Since Windows RRAS does not perform verification when parsing the pointer returned by the network, an unauthenticated attacker can trick the user into connecting to a malicious VPN\/RRAS server and fill in a specially designed pointer in the return packet to achieve remote code execution. CVSS score 8.8.<\/p>\n\n\n\n<p>Official announcement link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62549\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-62549<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p>The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th><strong>Vulnerability Number<\/strong><\/th><th><strong>Affected product versions<\/strong><\/th><\/tr><\/thead><tbody><tr><td>CVE-2025-62221<br>CVE-2025-59516<\/td><td>Windows&nbsp;10&nbsp;Version&nbsp;1809&nbsp;for&nbsp;32-bit&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;1809&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;21H2&nbsp;for&nbsp;32-bit&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;21H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;21H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;22H2&nbsp;for&nbsp;32-bit&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;22H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;22H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;23H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;23H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;24H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;24H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;25H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;25H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;Server&nbsp;2019&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2019<br>Windows&nbsp;Server&nbsp;2022&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2022<br>Windows&nbsp;Server&nbsp;2022,&nbsp;23H2&nbsp;Edition&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2025&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2025<\/td><\/tr><tr><td>CVE-2025-62554<br>CVE-2025-62557<\/td><td>Microsoft&nbsp;Office&nbsp;2016&nbsp;(32-bit&nbsp;edition)<br>Microsoft&nbsp;Office&nbsp;2016&nbsp;(64-bit&nbsp;edition)<br>Microsoft&nbsp;Office&nbsp;2019&nbsp;for&nbsp;32-bit&nbsp;editions<br>Microsoft&nbsp;Office&nbsp;2019&nbsp;for&nbsp;64-bit&nbsp;editions<br>Microsoft&nbsp;Office&nbsp;LTSC&nbsp;2021&nbsp;for&nbsp;32-bit&nbsp;editions<br>Microsoft&nbsp;Office&nbsp;LTSC&nbsp;2021&nbsp;for&nbsp;64-bit&nbsp;editions<br>Microsoft&nbsp;Office&nbsp;LTSC&nbsp;for&nbsp;Mac&nbsp;2021<br>Microsoft&nbsp;Office&nbsp;LTSC&nbsp;2024&nbsp;for&nbsp;32-bit&nbsp;editions<br>Microsoft&nbsp;Office&nbsp;LTSC&nbsp;2024&nbsp;for&nbsp;64-bit&nbsp;editions<br>Microsoft&nbsp;Office&nbsp;LTSC&nbsp;for&nbsp;Mac&nbsp;2024<br>Microsoft&nbsp;365&nbsp;Apps&nbsp;for&nbsp;Enterprise&nbsp;for&nbsp;32-bit&nbsp;Systems<br>Microsoft&nbsp;365&nbsp;Apps&nbsp;for&nbsp;Enterprise&nbsp;for&nbsp;64-bit&nbsp;Systems<br>Microsoft&nbsp;Office&nbsp;for&nbsp;Android<\/td><\/tr><tr><td>CVE-2025-62456<\/td><td>Windows&nbsp;11&nbsp;Version&nbsp;23H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;23H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;24H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;24H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;25H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;25H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;Server&nbsp;2022&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2022<br>Windows&nbsp;Server&nbsp;2022,&nbsp;23H2&nbsp;Edition&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2025&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2025<\/td><\/tr><tr><td>CVE-2025-64666<\/td><td>Microsoft&nbsp;Exchange&nbsp;Server&nbsp;2016&nbsp;Cumulative&nbsp;Update&nbsp;23<br>Microsoft&nbsp;Exchange&nbsp;Server&nbsp;2019&nbsp;Cumulative&nbsp;Update&nbsp;14<br>Microsoft&nbsp;Exchange&nbsp;Server&nbsp;2019&nbsp;Cumulative&nbsp;Update&nbsp;15<br>Microsoft&nbsp;Exchange&nbsp;Server&nbsp;Subscription&nbsp;Edition&nbsp;RTM<\/td><\/tr><tr><td>CVE-2025-62472<br>CVE-2025-62549<\/td><td>Windows&nbsp;10&nbsp;Version&nbsp;1607&nbsp;for&nbsp;32-bit&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;1607&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;1809&nbsp;for&nbsp;32-bit&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;1809&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;21H2&nbsp;for&nbsp;32-bit&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;21H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;21H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;22H2&nbsp;for&nbsp;32-bit&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;22H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;10&nbsp;Version&nbsp;22H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;23H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;23H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;24H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;24H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;25H2&nbsp;for&nbsp;x64-based&nbsp;Systems<br>Windows&nbsp;11&nbsp;Version&nbsp;25H2&nbsp;for&nbsp;ARM64-based&nbsp;Systems<br>Windows&nbsp;Server&nbsp;2008&nbsp;for&nbsp;32-bit&nbsp;Systems&nbsp;Service&nbsp;Pack&nbsp;2&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2008&nbsp;for&nbsp;32-bit&nbsp;Systems&nbsp;Service&nbsp;Pack&nbsp;2<br>Windows&nbsp;Server&nbsp;2008&nbsp;for&nbsp;x64-based&nbsp;Systems&nbsp;Service&nbsp;Pack&nbsp;2&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2008&nbsp;for&nbsp;x64-based&nbsp;Systems&nbsp;Service&nbsp;Pack&nbsp;2<br>Windows&nbsp;Server&nbsp;2008&nbsp;R2&nbsp;for&nbsp;x64-based&nbsp;Systems&nbsp;Service&nbsp;Pack&nbsp;1&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2008&nbsp;R2&nbsp;for&nbsp;x64-based&nbsp;Systems&nbsp;Service&nbsp;Pack&nbsp;1<br>Windows&nbsp;Server&nbsp;2012&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2012<br>Windows&nbsp;Server&nbsp;2012&nbsp;R2&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2012&nbsp;R2<br>Windows&nbsp;Server&nbsp;2016&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2016<br>Windows&nbsp;Server&nbsp;2019&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2019<br>Windows&nbsp;Server&nbsp;2022&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2022<br>Windows&nbsp;Server&nbsp;2022,&nbsp;23H2&nbsp;Edition&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2025&nbsp;(Server&nbsp;Core&nbsp;installation)<br>Windows&nbsp;Server&nbsp;2025<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Patch update<\/strong><\/p>\n\n\n\n<p>At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Dec\">https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Dec<\/a><\/p>\n\n\n\n<p>Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.<\/p>\n\n\n\n<p>Right-click the Windows icon, select &#8220;Settings (N)&#8221;, select &#8220;Update and Security&#8221;-&#8220;Windows Update&#8221;, view the prompt information on this page, or click &#8220;View Update History&#8221; to view the historical update status.<\/p>\n\n\n\n<p>For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the &#8220;Microsoft Update Catalog&#8221; website to download the independent program package and install it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Appendix: Vulnerability List<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Affected products<\/strong><\/th><th><strong>CVE No.<\/strong><\/th><th><strong>Vulnerability Title<\/strong><\/th><th><strong>Severity<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Microsoft Office<\/td><td>CVE-2025-62562<\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62554<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62557<\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62454<\/td><td>Windows Cloud Files Mini Filter Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62456<\/td><td>Windows Resilient File System (ReFS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62457<\/td><td>Windows Cloud Files Mini Filter Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62458<\/td><td>Win32k Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62466<\/td><td>Windows Client-Side Caching Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62469<\/td><td>Microsoft Brokering File System Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62470<\/td><td>Windows Common Log File System Driver Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62472<\/td><td>Windows Remote Access Connection Manager privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62473<\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62549<\/td><td>Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62561<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62563<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62564<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62571<\/td><td>Windows Installer privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62572<\/td><td>Application Information Service privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62573<\/td><td>DirectX Graphics Kernel privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-64658<\/td><td>Windows File Explorer Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server,Microsoft Exchange Server Subscription Edition RTM<\/td><td>CVE-2025-64667<\/td><td>Microsoft Exchange Server spoofing vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server,Microsoft Exchange Server Subscription Edition RTM<\/td><td>CVE-2025-64666<\/td><td>Microsoft Exchange Server privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-64670<\/td><td>Windows DirectX Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-64673<\/td><td>Windows Storage VSP Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-59516<\/td><td>Windows Storage VSP Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-59517<\/td><td>Windows Storage VSP Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62455<\/td><td>Microsoft Message Queuing (MSMQ) Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62461<\/td><td>Windows Projected File System Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62462<\/td><td>Windows Projected File System Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62463<\/td><td>DirectX Graphics Kernel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62464<\/td><td>Windows Projected File System Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62465<\/td><td>DirectX Graphics Kernel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-55233<\/td><td>Windows Projected File System Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62467<\/td><td>Windows Projected File System Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62468<\/td><td>Windows Defender Firewall Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62474<\/td><td>Windows Remote Access Connection Manager privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure<\/td><td>CVE-2025-62550<\/td><td>Azure Monitor Agent remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62552<\/td><td>Microsoft Access Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62553<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62555<\/td><td>Microsoft Word remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62556<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62558<\/td><td>Microsoft Word remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62559<\/td><td>Microsoft Word remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-62560<\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62567<\/td><td>Windows Hyper-V denial of service vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62569<\/td><td>Microsoft Brokering File System Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62570<\/td><td>Windows Camera Frame Server Monitor Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62565<\/td><td>Windows File Explorer Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-64661<\/td><td>Windows Shell Privilege Escalation Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Other<\/td><td>CVE-2025-64671<\/td><td>GitHub Copilot for Jetbrains remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td>CVE-2025-64672<\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-64678<\/td><td>Windows Routing and Remote Access Service (RRAS) remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-64679<\/td><td>Windows DWM Core Library privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-64680<\/td><td>Windows DWM Core Library privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-62221<\/td><td>Windows Cloud Files Mini Filter Driver privilege escalation vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows<\/td><td>CVE-2025-54100<\/td><td>PowerShell remote code execution vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td>CVE-2025-62223<\/td><td>Microsoft Edge (Chromium-based) for Mac spoofing vulnerability<\/td><td>Low<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.<\/p>\n\n\n\n<p>Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world\u2019s top ten telecommunications companies.<\/p>\n\n\n\n<p>Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview On December 10, NSFOCUS CERT detected that Microsoft released the December Security Update patch, which fixed 57 security issues involving widely used products such as Windows, Microsoft Office, Microsoft Exchange Server, Azure, etc., including high-risk vulnerability types such as privilege escalation and remote code execution. Among the vulnerabilities fixed by Microsoft&#8217;s monthly update this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28664,"comment_status":"open","ping_status":"open","sticky":false,"template":"post-templates\/single-layout-8.php","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[902,512,516,518,521,523,2080,605,752,758],"class_list":["post-34869","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-github","tag-microsoft","tag-microsoft-office","tag-microsoft-security","tag-microsoft-sql-server","tag-microsoft-vulnerabilities","tag-powershell","tag-rce","tag-windows","tag-windows-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview On December 10, NSFOCUS CERT detected that Microsoft released the December Security Update patch, which fixed 57 security issues involving widely\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T07:21:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T08:49:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview On December 10, NSFOCUS CERT detected that Microsoft released the December Security Update patch, which fixed 57 security issues involving widely\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products\",\"datePublished\":\"2025-12-11T07:21:35+00:00\",\"dateModified\":\"2026-04-13T08:49:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"},\"wordCount\":2783,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"keywords\":[\"GitHub\",\"Microsoft\",\"microsoft office\",\"Microsoft Security\",\"Microsoft SQL Server\",\"Microsoft Vulnerabilities\",\"PowerShell\",\"RCE\",\"Windows\",\"Windows Vulnerability\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\",\"name\":\"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"datePublished\":\"2025-12-11T07:21:35+00:00\",\"dateModified\":\"2026-04-13T08:49:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Critical.png\",\"width\":169,\"height\":107,\"caption\":\"Critical alert icon with shield symbol.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","og_description":"Overview On December 10, NSFOCUS CERT detected that Microsoft released the December Security Update patch, which fixed 57 security issues involving widely","og_url":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/","og_site_name":"NSFOCUS","article_published_time":"2025-12-11T07:21:35+00:00","article_modified_time":"2026-04-13T08:49:04+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","twitter_description":"Overview On December 10, NSFOCUS CERT detected that Microsoft released the December Security Update patch, which fixed 57 security issues involving widely","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products","datePublished":"2025-12-11T07:21:35+00:00","dateModified":"2026-04-13T08:49:04+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/"},"wordCount":2783,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","keywords":["GitHub","Microsoft","microsoft office","Microsoft Security","Microsoft SQL Server","Microsoft Vulnerabilities","PowerShell","RCE","Windows","Windows Vulnerability"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/","url":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/","name":"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","datePublished":"2025-12-11T07:21:35+00:00","dateModified":"2026-04-13T08:49:04+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/04\/Critical.png","width":169,"height":107,"caption":"Critical alert icon with shield symbol."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/microsofts-december-security-update-of-high-risk-vulnerability-notice-for-multiple-products\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Microsoft\u2019s December Security Update of High-Risk Vulnerability Notice for Multiple Products"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/34869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=34869"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/34869\/revisions"}],"predecessor-version":[{"id":35565,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/34869\/revisions\/35565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/28664"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=34869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=34869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=34869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}