Alcune aziende che ci hanno scelto

Privacy Officer e consulente privacy
Schema CDP secondo la norma ISO/IEC 17024:2012
European Privacy Auditor
Schema di Certificazione ISDP©10003 secondo la norma ISO/IEC 17065:2012
Valutatore Privacy
Secondo la norma UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
Secondo la norma ISO/IEC 17024:2012
Data Protection Officer
Secondo la norma ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
Secondo la norma ISO/IEC 17024:2012
ICT Security Manager
Secondo la norma UNI 11506:2017
IT Service Management (ITSM)
Secondo l’Ente ITIL Foundation
Ethical Hacker (CEH)
Secondo l’Ente EC-Council
Network Defender (CND)
Secondo l’Ente EC-Council
Computer Hacking Forensics Investigator (CHFI)
Secondo l’Ente EC-Council
Penetration Testing Professional (CPENT)
Secondo l’Ente EC-Council

Qualifiche professionali

Rimani aggiornato sulle notizie dal mondo!

Seleziona gli argomenti di tuo interesse:
ALLERTA CYBER
Home / ALLERTA CYBER
/
Aggiornamenti Mensili Microsoft (AL01/250115/CSIRT-ITA)

Aggiornamenti Mensili Microsoft (AL01/250115/CSIRT-ITA)

Sintesi

Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 159 nuove vulnerabilità, di cui 8 di tipo 0-day.

Note: un Proof of Concept (PoC) per lo sfruttamento della CVE-2025-21298 risulterebbe disponibile in rete.

Note: le CVE-2025-21333, CVE-2025-21334CVE-2025-21335 risultano essere sfruttate attivamente in rete.

Note: dei Proof of Concept (PoC) per lo sfruttamento delle CVE-2025-21186CVE-2025-21275CVE-2025-21308CVE-2025-21366CVE-2025-21395 risulterebbero disponibili in rete.

Rischio

Stima d’impatto della vulnerabilità sulla comunità di riferimento: Critico (79.23)

Tipologia

  • Remote Code Execution
  • Security Feature Bypass
  • Spoofing
  • Elevation of Privilege
  • Denial of Service
  • Information Disclosure

Descrizione e potenziali impatti

Nel dettaglio, le vulnerabilità sfruttate attivamente in rete e/o per le quali risulta disponibile in rete anche un “proof of concept”, riguardano:

  • Microsoft Access: identificate tramite le CVE-2025-21366CVE-2025-21395 e CVE-2025-21186, di tipo ” Arbitrary Code Execution” e con score CVSS v3 pari a 7.8. Tali vulnerabilità potrebbero essere sfruttate tramite la distribuzione di documenti opportunamente predisposti al fine di eseguire codice arbitrario sui dispositivi target.
  • Windows Hyper-V: identificate tramite le CVE-2025-21333CVE-2025-21334 e CVE-2025-21335, di tipo ” Elevation of Privilege” e con score CVSS v3 pari a 7.8. Tali vulnerabilità risiedono nel servizio di integrazione del kernel NT (VSP) di Windows Hyper-V e potrebbe permettere l’ottenimento di privilegi di tipo SYSTEM sui dispositivi interessati tramite l’accesso non autorizzato a porzioni di memoria deallocate – use-after-free.
  • Windows App Package Installer: identificata tramite la CVE-2025-21275, di tipo ” Elevation of Privilege” e con score CVSS v3 pari a 7.8. Tale vulnerabilità, qualora sfruttata, potrebbe permettere l’ottenimento di privilegi di tipo SYSTEM sui dispositivi interessati.
  • Windows Themes: identificata tramite la CVE-2025-21308, di tipo “Spoofing” e con score CVSS v3 pari a 6.5. Tale vulnerabilità potrebbe permettere ad un utente malevolo di distribuire documenti opportunamente predisposti tramite e-mail e/o messaggistica istantanea, esortando la vittima a manipolarli.
  • NB: i sistemi con il protocollo NTLM disabilitato non risultano vulnerabili.

Prodotti e versioni affette:

  • .NET, .NET Framework
  • Active Directory Domain Services
  • Active Directory Federation Services
  • BranchCache
  • IP Helper
  • Hyper-V
  • Line Printer Daemon Service (LPD)
  • MapUrlToZone
  • Microsoft Azure Gateway Manager
  • Microsoft Brokering File System
  • Microsoft Digest Authentication
  • Microsoft Graphics Component
  • Microsoft Office
  • Microsoft Office Access
  • Microsoft Office Excel
  • Microsoft Office OneNote
  • Microsoft Office Outlook
  • Microsoft Office Outlook for Mac
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Office Word
  • Microsoft Teams
  • Microsoft Windows Search Component
  • Power Automate
  • Reliable Multicast Transport Driver (RMCAST)
  • Visual Studio
  • Windows BitLocker
  • Windows Boot Loader
  • Windows Boot Manager
  • Windows Client-Side Caching (CSC) Service
  • Windows Cloud Files Mini Filter Driver
  • Windows COM
  • Windows Connected Devices Platform Service
  • Windows Cryptographic Services
  • Windows Digital Media
  • Windows Direct Show
  • Windows DWM Core Library
  • Windows Event Tracing
  • Windows Geolocation Service
  • Windows Hello
  • Windows Installer
  • Windows Kerberos
  • Windows Kernel Memory
  • Windows Mark of the Web (MOTW)
  • Windows Message Queuing
  • Windows OLE
  • Windows PrintWorkflowUserSvc
  • Windows Recovery Environment Agent
  • Windows Remote Desktop Services
  • Windows Secure Boot
  • Windows Smart Card
  • Windows SmartScreen
  • Windows SPNEGO Extended Negotiation
  • Windows Telephony Service
  • Windows Themes
  • Windows UPnP Device Host
  • Windows Virtual Trusted Platform Module
  • Windows Virtualization-Based Security (VBS) Enclave
  • Windows Web Threat Defense User Service
  • Windows Win32K – GRFX
  • Windows WLAN Auto Config Service

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.

CVE
CVE-2024-50338CVE-2025-21233CVE-2025-21272CVE-2025-21306CVE-2025-21341
CVE-2024-7344CVE-2025-21234CVE-2025-21273CVE-2025-21307CVE-2025-21343
CVE-2025-21171CVE-2025-21235CVE-2025-21274CVE-2025-21308CVE-2025-21344
CVE-2025-21172CVE-2025-21236CVE-2025-21275CVE-2025-21309CVE-2025-21345
CVE-2025-21173CVE-2025-21237CVE-2025-21276CVE-2025-21310CVE-2025-21346
CVE-2025-21176CVE-2025-21238CVE-2025-21277CVE-2025-21311CVE-2025-21348
CVE-2025-21178CVE-2025-21239CVE-2025-21278CVE-2025-21312CVE-2025-21354
CVE-2025-21186CVE-2025-21240CVE-2025-21280CVE-2025-21313CVE-2025-21356
CVE-2025-21187CVE-2025-21241CVE-2025-21281CVE-2025-21314CVE-2025-21357
CVE-2025-21189CVE-2025-21242CVE-2025-21282CVE-2025-21315CVE-2025-21360
CVE-2025-21193CVE-2025-21243CVE-2025-21284CVE-2025-21316CVE-2025-21361
CVE-2025-21202CVE-2025-21244CVE-2025-21285CVE-2025-21317CVE-2025-21362
CVE-2025-21207CVE-2025-21245CVE-2025-21286CVE-2025-21318CVE-2025-21363
CVE-2025-21210CVE-2025-21246CVE-2025-21287CVE-2025-21319CVE-2025-21364
CVE-2025-21211CVE-2025-21248CVE-2025-21288CVE-2025-21320CVE-2025-21365
CVE-2025-21213CVE-2025-21249CVE-2025-21289CVE-2025-21321CVE-2025-21366
CVE-2025-21214CVE-2025-21250CVE-2025-21290CVE-2025-21323CVE-2025-21370
CVE-2025-21215CVE-2025-21251CVE-2025-21291CVE-2025-21324CVE-2025-21372
CVE-2025-21217CVE-2025-21252CVE-2025-21292CVE-2025-21326CVE-2025-21374
CVE-2025-21218CVE-2025-21255CVE-2025-21293CVE-2025-21327CVE-2025-21378
CVE-2025-21219CVE-2025-21256CVE-2025-21294CVE-2025-21328CVE-2025-21382
CVE-2025-21220CVE-2025-21257CVE-2025-21295CVE-2025-21329CVE-2025-21389
CVE-2025-21223CVE-2025-21258CVE-2025-21296CVE-2025-21330CVE-2025-21393
CVE-2025-21224CVE-2025-21260CVE-2025-21297CVE-2025-21331CVE-2025-21395
CVE-2025-21225CVE-2025-21261CVE-2025-21298CVE-2025-21332CVE-2025-21402
CVE-2025-21226CVE-2025-21263CVE-2025-21299CVE-2025-21333CVE-2025-21403
CVE-2025-21227CVE-2025-21265CVE-2025-21300CVE-2025-21334CVE-2025-21405
CVE-2025-21228CVE-2025-21266CVE-2025-21301CVE-2025-21335CVE-2025-21409
CVE-2025-21229CVE-2025-21268CVE-2025-21302CVE-2025-21336CVE-2025-21411
CVE-2025-21230CVE-2025-21269CVE-2025-21303CVE-2025-21338CVE-2025-21413
CVE-2025-21231CVE-2025-21270CVE-2025-21304CVE-2025-21339CVE-2025-21417
CVE-2025-21232CVE-2025-21271CVE-2025-21305CVE-2025-21340

Riferimenti

https://msrc.microsoft.com/update-guide/releaseNote/2025-Jan

https://msrc.microsoft.com/update-guide

1La presente stima è effettuata tenendo conto di diversi parametri, tra i quali: CVSS, disponibilità di patch/workaround e PoC, diffusione dei software/dispositivi interessati nella comunità di riferimento.

Suggeriti per te

Ricerca in 365TRUST

I nostri servizi