Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Microsoft Monthly Updates (AL01/250115/CSIRT-ITA)

Microsoft Monthly Updates (AL01/250115/CSIRT-ITA)

Summary

Microsoft has released monthly security updates that address a total of 159 new vulnerabilities, including 8 0-day vulnerabilities.

Note: A Proof of Concept (PoC) for the exploitation of CVE-2025-21298 is reportedly available online.

Note: CVE-2025-21333, CVE-2025-21334CVE-2025-21335 are reportedly being actively exploited online.

Note: Proof of Concept (PoC) for the exploitation of CVE-2025-21186CVE-2025-21275CVE-2025-21308CVE-2025-21366CVE-2025-21395 is reportedly available online.

Risk

Estimate of impact of vulnerability on the reference community: Critical (79.23)

Typology

  • Remote Code Execution
  • Security Feature Bypass
  • Spoofing
  • Elevation of Privilege
  • Denial of Service
  • Information Disclosure

Description and potential impacts

In detail, the vulnerabilities actively exploited online and/or for which a “proof of concept” is also available online, concern:

  • Microsoft Access: identified through CVE-2025-21366, CVE-2025-21395 and CVE-2025-21186, of the “Arbitrary Code Execution” type and with a CVSS v3 score of 7.8. These vulnerabilities could be exploited through the distribution of appropriately crafted documents in order to execute arbitrary code on the target devices.
  • Windows Hyper-V: identified through CVE-2025-21333, CVE-2025-21334 and CVE-2025-21335, of the “Elevation of Privilege” type and with a CVSS v3 score of 7.8. These vulnerabilities reside in the Windows Hyper-V NT Kernel Integration Service (VSP) and could allow SYSTEM privileges to be obtained on affected devices through unauthorized access to deallocated memory portions – use-after-free.
  • Windows App Package Installer: identified by CVE-2025-21275, of the “Elevation of Privilege” type and with a CVSS v3 score of 7.8. This vulnerability, if exploited, could allow SYSTEM privileges to be obtained on affected devices.
  • Windows Themes: identified by CVE-2025-21308, of the “Spoofing” type and with a CVSS v3 score of 6.5. This vulnerability could allow a malicious user to distribute appropriately crafted documents via email and/or instant messaging, encouraging the victim to manipulate them.
  • NB: systems with the NTLM protocol disabled are not vulnerable.

Affected products and versions:

  • .NET, .NET Framework
  • Active Directory Domain Services
  • Active Directory Federation Services
  • BranchCache
  • IP Helper
  • Hyper-V
  • Line Printer Daemon Service (LPD)
  • MapUrlToZone
  • Microsoft Azure Gateway Manager
  • Microsoft Brokering File System
  • Microsoft Digest Authentication
  • Microsoft Graphics Component
  • Microsoft Office
  • Microsoft Office Access
  • Microsoft Office Excel
  • Microsoft Office OneNote
  • Microsoft Office Outlook
  • Microsoft Office Outlook for Mac
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Office Word
  • Microsoft Teams
  • Microsoft Windows Search Component
  • Power Automate
  • Reliable Multicast Transport Driver (RMCAST)
  • Visual Studio
  • Windows BitLocker
  • Windows Boot Loader
  • Windows Boot Manager
  • Windows Client-Side Caching (CSC) Service
  • Windows Cloud Files Mini Filter Driver
  • Windows COM
  • Windows Connected Devices Platform Service
  • Windows Cryptographic Services
  • Windows Digital Media
  • Windows Direct Show
  • Windows DWM Core Library
  • Windows Event Tracing
  • Windows Geolocation Service
  • Windows Hello
  • Windows Installer
  • Windows Kerberos
  • Windows Kernel Memory
  • Windows Mark of the Web (MOTW)
  • Windows Message Queuing
  • Windows OLE
  • Windows PrintWorkflowUserSvc
  • Windows Recovery Environment Agent
  • Windows Remote Desktop Services
  • Windows Secure Boot
  • Windows Smart Card
  • Windows SmartScreen
  • Windows SPNEGO Extended Negotiation
  • Windows Telephony Service
  • Windows Themes
  • Windows UPnP Device Host
  • Windows Virtual Trusted Platform Module
  • Windows Virtualization-Based Security (VBS) Enclave
  • Windows Web Threat Defense User Service
  • Windows Win32K – GRFX
  • Windows WLAN Auto Config Service

Mitigation Actions

In line with vendor statements, it is recommended to update impacted products through the appropriate Windows Update function.

CVE
CVE-2024-50338CVE-2025-21233CVE-2025-21272CVE-2025-21306CVE-2025-21341
CVE-2024-7344CVE-2025-21234CVE-2025-21273CVE-2025-21307CVE-2025-21343
CVE-2025-21171CVE-2025-21235CVE-2025-21274CVE-2025-21308CVE-2025-21344
CVE-2025-21172CVE-2025-21236CVE-2025-21275CVE-2025-21309CVE-2025-21345
CVE-2025-21173CVE-2025-21237CVE-2025-21276CVE-2025-21310CVE-2025-21346
CVE-2025-21176CVE-2025-21238CVE-2025-21277CVE-2025-21311CVE-2025-21348
CVE-2025-21178CVE-2025-21239CVE-2025-21278CVE-2025-21312CVE-2025-21354
CVE-2025-21186CVE-2025-21240CVE-2025-21280CVE-2025-21313CVE-2025-21356
CVE-2025-21187CVE-2025-21241CVE-2025-21281CVE-2025-21314CVE-2025-21357
CVE-2025-21189CVE-2025-21242CVE-2025-21282CVE-2025-21315CVE-2025-21360
CVE-2025-21193CVE-2025-21243CVE-2025-21284CVE-2025-21316CVE-2025-21361
CVE-2025-21202CVE-2025-21244CVE-2025-21285CVE-2025-21317CVE-2025-21362
CVE-2025-21207CVE-2025-21245CVE-2025-21286CVE-2025-21318CVE-2025-21363
CVE-2025-21210CVE-2025-21246CVE-2025-21287CVE-2025-21319CVE-2025-21364
CVE-2025-21211CVE-2025-21248CVE-2025-21288CVE-2025-21320CVE-2025-21365
CVE-2025-21213CVE-2025-21249CVE-2025-21289CVE-2025-21321CVE-2025-21366
CVE-2025-21214CVE-2025-21250CVE-2025-21290CVE-2025-21323CVE-2025-21370
CVE-2025-21215CVE-2025-21251CVE-2025-21291CVE-2025-21324CVE-2025-21372
CVE-2025-21217CVE-2025-21252CVE-2025-21292CVE-2025-21326CVE-2025-21374
CVE-2025-21218CVE-2025-21255CVE-2025-21293CVE-2025-21327CVE-2025-21378
CVE-2025-21219CVE-2025-21256CVE-2025-21294CVE-2025-21328CVE-2025-21382
CVE-2025-21220CVE-2025-21257CVE-2025-21295CVE-2025-21329CVE-2025-21389
CVE-2025-21223CVE-2025-21258CVE-2025-21296CVE-2025-21330CVE-2025-21393
CVE-2025-21224CVE-2025-21260CVE-2025-21297CVE-2025-21331CVE-2025-21395
CVE-2025-21225CVE-2025-21261CVE-2025-21298CVE-2025-21332CVE-2025-21402
CVE-2025-21226CVE-2025-21263CVE-2025-21299CVE-2025-21333CVE-2025-21403
CVE-2025-21227CVE-2025-21265CVE-2025-21300CVE-2025-21334CVE-2025-21405
CVE-2025-21228CVE-2025-21266CVE-2025-21301CVE-2025-21335CVE-2025-21409
CVE-2025-21229CVE-2025-21268CVE-2025-21302CVE-2025-21336CVE-2025-21411
CVE-2025-21230CVE-2025-21269CVE-2025-21303CVE-2025-21338CVE-2025-21413
CVE-2025-21231CVE-2025-21270CVE-2025-21304CVE-2025-21339CVE-2025-21417
CVE-2025-21232CVE-2025-21271CVE-2025-21305CVE-2025-21340

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services