Refine your search
1007 vulnerabilities found for windows by microsoft
CERTFR-2025-AVI-0996
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que la vulnérabilité CVE-2025-62215 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6575 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8594 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21161 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.7092 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4346 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4346 | ||
| Microsoft | Windows | Windows Subsystem pour Linux GUI versions antérieures à 2.6.2 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25768 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.8027 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6575 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6575 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22631.6060 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.6199 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.8027 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6575 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6575 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25768 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.8027 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.28021 | ||
| Microsoft | Windows | Windows 11 Version 25H2 pour systèmes ARM64 versions antérieures à 10.0.26200.7092 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6575 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8594 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.7092 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23624 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23624 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8594 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6060 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23624 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22869 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.28021 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.7092 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8594 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1965 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23624 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.7092 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6199 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.8027 | ||
| Microsoft | Windows | Windows 11 Version 25H2 pour systèmes x64 versions antérieures à 10.0.26200.7092 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21161 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6575",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8594",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.7092",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4346",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4346",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Subsystem pour Linux GUI versions ant\u00e9rieures \u00e0 2.6.2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25768",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.8027",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6575",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6575",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6199",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.8027",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6575",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6575",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25768",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.8027",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.28021",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26200.7092",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6575",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8594",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.7092",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23624",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23624",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8594",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23624",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22869",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.28021",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.7092",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8594",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1965",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23624",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.7092",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6199",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.8027",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26200.7092",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-60714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60714"
},
{
"name": "CVE-2025-62209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62209"
},
{
"name": "CVE-2025-62213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62213"
},
{
"name": "CVE-2025-59507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59507"
},
{
"name": "CVE-2025-60719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60719"
},
{
"name": "CVE-2025-60709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60709"
},
{
"name": "CVE-2025-62217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62217"
},
{
"name": "CVE-2025-59510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59510"
},
{
"name": "CVE-2025-60705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60705"
},
{
"name": "CVE-2025-60716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60716"
},
{
"name": "CVE-2025-62215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62215"
},
{
"name": "CVE-2025-59514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59514"
},
{
"name": "CVE-2025-62452",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62452"
},
{
"name": "CVE-2025-60704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60704"
},
{
"name": "CVE-2025-60720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60720"
},
{
"name": "CVE-2025-60724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60724"
},
{
"name": "CVE-2025-60708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60708"
},
{
"name": "CVE-2025-60723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60723"
},
{
"name": "CVE-2025-60706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60706"
},
{
"name": "CVE-2025-60718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60718"
},
{
"name": "CVE-2025-60713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60713"
},
{
"name": "CVE-2025-59505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59505"
},
{
"name": "CVE-2025-59515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59515"
},
{
"name": "CVE-2025-60707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60707"
},
{
"name": "CVE-2025-62220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62220"
},
{
"name": "CVE-2025-59513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59513"
},
{
"name": "CVE-2025-59511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59511"
},
{
"name": "CVE-2025-60715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60715"
},
{
"name": "CVE-2025-62218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62218"
},
{
"name": "CVE-2025-59508",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59508"
},
{
"name": "CVE-2025-60710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60710"
},
{
"name": "CVE-2025-59509",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59509"
},
{
"name": "CVE-2025-59506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59506"
},
{
"name": "CVE-2025-62208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62208"
},
{
"name": "CVE-2025-60721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60721"
},
{
"name": "CVE-2025-62219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62219"
},
{
"name": "CVE-2025-60717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60717"
},
{
"name": "CVE-2025-60703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60703"
},
{
"name": "CVE-2025-59512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59512"
}
],
"initial_release_date": "2025-11-12T00:00:00",
"last_revision_date": "2025-11-12T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0996",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-62215 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60721",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60721"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60707",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60707"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59514",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59514"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60716",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60716"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60717"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60720"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59510",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59510"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59509",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59509"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62219",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62219"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62213",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62213"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60708",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60708"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60706",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60706"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59513",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59513"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59506",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59506"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59515",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59515"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59507",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59507"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60714",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60714"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62215",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62209",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62209"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62208",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62208"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60715",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60715"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62220",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62220"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60723",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60723"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60719",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60719"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62217",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62217"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59512",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59512"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62452",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62452"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59505",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59505"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60724",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60724"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60704",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60704"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60713",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60713"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60710",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60709",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60709"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59511",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59511"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60703",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60703"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59508",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59508"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60718",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60718"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60705",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60705"
},
{
"published_at": "2025-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62218",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62218"
}
]
}
CERTFR-2025-AVI-0930
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Microsoft Windows Server Update Service. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
L'éditeur a publié un nouveau correctif de sécurité pour cette vulnérabilité qui remplace le correctif précédemment listé dans l'avis CERTFR-2025-AVI-0879.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
La vulnérabilité concerne la fonctionnalité Windows Server Update Service (WSUS) activée sur Windows Server.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1916 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4297 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.6905 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8524 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7922 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22826 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25728 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8524 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22826 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4297 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6905 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7922 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25728 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1916",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4297",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6905",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7922",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22826",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25728",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22826",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4297",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6905",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7922",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25728",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "La vuln\u00e9rabilit\u00e9 concerne la fonctionnalit\u00e9 Windows Server Update Service (WSUS) activ\u00e9e sur Windows Server.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-59287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59287"
}
],
"initial_release_date": "2025-10-27T00:00:00",
"last_revision_date": "2025-10-27T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0930",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows Server Update Service. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n\nL\u0027\u00e9diteur a publi\u00e9 un nouveau correctif de s\u00e9curit\u00e9 pour cette vuln\u00e9rabilit\u00e9 qui remplace le correctif pr\u00e9c\u00e9demment list\u00e9 dans l\u0027avis CERTFR-2025-AVI-0879. ",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows Server Update Service",
"vendor_advisories": [
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
}
]
}
CERTFR-2025-AVI-0879
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que les vulnérabilités CVE-2025-24990, CVE-2025-47827 et CVE-2025-59230 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21161 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25722 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22824 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4294 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4294 | ||
| Microsoft | Windows | Windows App Client pour Windows Desktop versions antérieures à 2.0.706.0 | ||
| Microsoft | Windows | Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6599.0 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27974 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1913 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows 11 Version 25H2 pour systèmes ARM64 versions antérieures à 10.0.26200.6899 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.6060 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.6060 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22824 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6060 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27974 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25722 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21161 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25722",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22824",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4294",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4294",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.706.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6599.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27974",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1913",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26200.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22824",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27974",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25722",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-55691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55691"
},
{
"name": "CVE-2025-58738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58738"
},
{
"name": "CVE-2025-58729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58729"
},
{
"name": "CVE-2025-55684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55684"
},
{
"name": "CVE-2025-59197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59197"
},
{
"name": "CVE-2025-55679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55679"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2025-58719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58719"
},
{
"name": "CVE-2025-59190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59190"
},
{
"name": "CVE-2025-58736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58736"
},
{
"name": "CVE-2025-59254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59254"
},
{
"name": "CVE-2025-59206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59206"
},
{
"name": "CVE-2025-59295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59295"
},
{
"name": "CVE-2025-59287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59287"
},
{
"name": "CVE-2025-55678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55678"
},
{
"name": "CVE-2025-59208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59208"
},
{
"name": "CVE-2025-58731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58731"
},
{
"name": "CVE-2025-55339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55339"
},
{
"name": "CVE-2025-59191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59191"
},
{
"name": "CVE-2025-55676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55676"
},
{
"name": "CVE-2025-58730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58730"
},
{
"name": "CVE-2025-59187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59187"
},
{
"name": "CVE-2025-55685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55685"
},
{
"name": "CVE-2025-59257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59257"
},
{
"name": "CVE-2025-58735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58735"
},
{
"name": "CVE-2025-58717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58717"
},
{
"name": "CVE-2025-59199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59199"
},
{
"name": "CVE-2025-59278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59278"
},
{
"name": "CVE-2025-59198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59198"
},
{
"name": "CVE-2025-58725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58725"
},
{
"name": "CVE-2025-55332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55332"
},
{
"name": "CVE-2025-59230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59230"
},
{
"name": "CVE-2025-55690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55690"
},
{
"name": "CVE-2025-58732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58732"
},
{
"name": "CVE-2025-59194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59194"
},
{
"name": "CVE-2025-59258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59258"
},
{
"name": "CVE-2025-55687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55687"
},
{
"name": "CVE-2025-55335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55335"
},
{
"name": "CVE-2025-53139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53139"
},
{
"name": "CVE-2025-59192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59192"
},
{
"name": "CVE-2025-59255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59255"
},
{
"name": "CVE-2025-58726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58726"
},
{
"name": "CVE-2025-47979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47979"
},
{
"name": "CVE-2025-59186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59186"
},
{
"name": "CVE-2025-58716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58716"
},
{
"name": "CVE-2025-58733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58733"
},
{
"name": "CVE-2025-59201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59201"
},
{
"name": "CVE-2025-58720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58720"
},
{
"name": "CVE-2025-59207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59207"
},
{
"name": "CVE-2025-55333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55333"
},
{
"name": "CVE-2025-59200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59200"
},
{
"name": "CVE-2025-59282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59282"
},
{
"name": "CVE-2025-55682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55682"
},
{
"name": "CVE-2025-55694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55694"
},
{
"name": "CVE-2025-58737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58737"
},
{
"name": "CVE-2025-55331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55331"
},
{
"name": "CVE-2025-59261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59261"
},
{
"name": "CVE-2025-55325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55325"
},
{
"name": "CVE-2025-59259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59259"
},
{
"name": "CVE-2025-55334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55334"
},
{
"name": "CVE-2025-59205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59205"
},
{
"name": "CVE-2025-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48813"
},
{
"name": "CVE-2025-48004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48004"
},
{
"name": "CVE-2025-59260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59260"
},
{
"name": "CVE-2025-55688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55688"
},
{
"name": "CVE-2025-55701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55701"
},
{
"name": "CVE-2025-59189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59189"
},
{
"name": "CVE-2025-55330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55330"
},
{
"name": "CVE-2025-55698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55698"
},
{
"name": "CVE-2025-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49708"
},
{
"name": "CVE-2025-59195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59195"
},
{
"name": "CVE-2025-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50152"
},
{
"name": "CVE-2025-59294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59294"
},
{
"name": "CVE-2025-59214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59214"
},
{
"name": "CVE-2025-55693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55693"
},
{
"name": "CVE-2025-59204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59204"
},
{
"name": "CVE-2025-55336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55336"
},
{
"name": "CVE-2025-24052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24052"
},
{
"name": "CVE-2025-55338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55338"
},
{
"name": "CVE-2025-55692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55692"
},
{
"name": "CVE-2025-55326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55326"
},
{
"name": "CVE-2025-59244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59244"
},
{
"name": "CVE-2025-55696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55696"
},
{
"name": "CVE-2025-59184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59184"
},
{
"name": "CVE-2025-59209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59209"
},
{
"name": "CVE-2025-55686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55686"
},
{
"name": "CVE-2025-47827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47827"
},
{
"name": "CVE-2025-59277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59277"
},
{
"name": "CVE-2025-59253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59253"
},
{
"name": "CVE-2025-50174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50174"
},
{
"name": "CVE-2025-59241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59241"
},
{
"name": "CVE-2025-58728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58728"
},
{
"name": "CVE-2025-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53150"
},
{
"name": "CVE-2025-59242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59242"
},
{
"name": "CVE-2025-55677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55677"
},
{
"name": "CVE-2025-59185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59185"
},
{
"name": "CVE-2025-55681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55681"
},
{
"name": "CVE-2025-58718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58718"
},
{
"name": "CVE-2025-55700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55700"
},
{
"name": "CVE-2025-59502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59502"
},
{
"name": "CVE-2025-59275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59275"
},
{
"name": "CVE-2025-59284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59284"
},
{
"name": "CVE-2025-55340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55340"
},
{
"name": "CVE-2025-58734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58734"
},
{
"name": "CVE-2025-55697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55697"
},
{
"name": "CVE-2025-59203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59203"
},
{
"name": "CVE-2025-58715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58715"
},
{
"name": "CVE-2025-55695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55695"
},
{
"name": "CVE-2025-59289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59289"
},
{
"name": "CVE-2025-58714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58714"
},
{
"name": "CVE-2025-25004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25004"
},
{
"name": "CVE-2025-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53768"
},
{
"name": "CVE-2025-55699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55699"
},
{
"name": "CVE-2025-50175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50175"
},
{
"name": "CVE-2025-59211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59211"
},
{
"name": "CVE-2025-58739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58739"
},
{
"name": "CVE-2025-59202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59202"
},
{
"name": "CVE-2025-59193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59193"
},
{
"name": "CVE-2025-55683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55683"
},
{
"name": "CVE-2025-59280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59280"
},
{
"name": "CVE-2025-24990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24990"
},
{
"name": "CVE-2025-59210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59210"
},
{
"name": "CVE-2025-58722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58722"
},
{
"name": "CVE-2025-59188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59188"
},
{
"name": "CVE-2025-55689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55689"
},
{
"name": "CVE-2025-58727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58727"
},
{
"name": "CVE-2025-55328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55328"
},
{
"name": "CVE-2025-59290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59290"
},
{
"name": "CVE-2025-55680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55680"
},
{
"name": "CVE-2025-2884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2884"
},
{
"name": "CVE-2025-53717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53717"
},
{
"name": "CVE-2025-59196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59196"
},
{
"name": "CVE-2025-55337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55337"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2025-54957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54957"
}
],
"initial_release_date": "2025-10-15T00:00:00",
"last_revision_date": "2025-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0879",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2025-24990, CVE-2025-47827 et CVE-2025-59230 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59205",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55682",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59204",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59275",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50175",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55697",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58737",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55326",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53139",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59502",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55328",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59261",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59214",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58718",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58738",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55687",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59255",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48004",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55688",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55700",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59259",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59196",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55336",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55696",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55685",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55694",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47827",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59254",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55340",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58722",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55690",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55692",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59184",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59192",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55683",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54957",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58714",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55689",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55693",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59194",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59197",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58736",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58716",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55333",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59190",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59198",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53150",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59202",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58730",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58733",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59200",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55701",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58734",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55698",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-25004",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59209",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59290",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59191",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55332",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55678",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59278",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59242",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55331",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58715",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47979",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59188",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59201",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55677",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58719",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58739",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24052",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58735",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55691",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55676",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55337",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59241",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55335",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59206",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59295",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55681",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55330",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59280",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59258",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59282",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59186",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55699",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24990",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59203",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59260",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55248",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58726",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55684",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48813",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59193",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59189",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55339",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58728",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59207",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55338",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59210",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2016-9535",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58725",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-2884",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53768",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59257",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55686",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59185",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55680",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59294",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49708",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59187",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50174",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58732",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55679",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59195",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50152",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59199",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55695",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55325",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59208",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208"
}
]
}
CERTFR-2025-AVI-0804
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5909 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.6508 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1849 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6332 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4106 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19043.6332 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19043.6332 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19043.6332 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19044.6332 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22631.5909 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5909 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6508 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6508 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5909 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6332 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6508 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4106 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1849",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6332",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4106",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19043.6332",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19043.6332",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19043.6332",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6332",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6508",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6332",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4106",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-59215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59215"
},
{
"name": "CVE-2025-59216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59216"
},
{
"name": "CVE-2025-59220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59220"
}
],
"initial_release_date": "2025-09-19T00:00:00",
"last_revision_date": "2025-09-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0804",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-19T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-09-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59215",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59215"
},
{
"published_at": "2025-09-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59216",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59216"
},
{
"published_at": "2025-09-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59220",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59220"
}
]
}
CERTFR-2025-AVI-0720
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7783 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1840 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4161 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25669 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6321 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6321 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6563 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5900 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6321 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7783 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6321 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6321 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.6563 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27924 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7783 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6321 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7783 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22767 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6563 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8416 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5900 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8416 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4161 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23524 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23524 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25669 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5900 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23524 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21122 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21122 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23524 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6563 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8416 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22767 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8416 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27924 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5900 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7783",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1840",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25669",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6321",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6321",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6563",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5900",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6321",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7783",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6321",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6321",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6563",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27924",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7783",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6321",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7783",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22767",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6563",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8416",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5900",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8416",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25669",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5900",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21122",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21122",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6563",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8416",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22767",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8416",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27924",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5900",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-55230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55230"
},
{
"name": "CVE-2025-55231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55231"
},
{
"name": "CVE-2025-55229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55229"
}
],
"initial_release_date": "2025-08-22T00:00:00",
"last_revision_date": "2025-08-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0720",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-08-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55231",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55231"
},
{
"published_at": "2025-08-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55230"
},
{
"published_at": "2025-08-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55229",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55229"
}
]
}
CERTFR-2025-AVI-0499
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que la vulnérabilité CVE-2025-33053 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25475 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22620 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.3981 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5335 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23351 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21034 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.4270 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27729 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23279 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8066 | ||
| Microsoft | Windows | Windows App Client pour Windows Desktop versions antérieures à 2.0.505.0 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 1 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5965 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7314 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5472 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.3630 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22620 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8148 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1611 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7434 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23279 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21014 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8066 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.4270 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5472 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25522 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.3981 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.3981 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23279 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7314 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23351 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5335 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.4270 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5965 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21014 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.4270 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5854 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5854 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7434 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25475 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23351 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5854 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5335 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7314 | ||
| Microsoft | Windows | Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6278.0 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1665 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3630 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8148 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21034 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8148 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8066 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.3745 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5965 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.3981 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5965 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7434 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23351 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5335 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8148 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22621.5335 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27769 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5854 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7434 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5854 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22577 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5965 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5472 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1 | ||
| Microsoft | Windows | Windows SDK versions antérieures à 10.0.26100.4188 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5854 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27769 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5965 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7314 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3745 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 1 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25522 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23279 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5335 | ||
| Microsoft | Windows | Windows Security App versions antérieures à 1000.27840.0.1000 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27729 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 1 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22577 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8066 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5472 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25475",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22620",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23351",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21034",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.4270",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27729",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23279",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8066",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.505.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5965",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7314",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5472",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3630",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22620",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8148",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1611",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7434",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23279",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21014",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8066",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.4270",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5472",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25522",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.3981",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23279",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7314",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23351",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5335",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.4270",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5965",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21014",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.4270",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5854",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5854",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7434",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25475",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23351",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5854",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5335",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7314",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6278.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1665",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3630",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8148",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21034",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8148",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8066",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3745",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5965",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5965",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7434",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23351",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8148",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27769",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5854",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7434",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5854",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22577",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5965",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5472",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows SDK versions ant\u00e9rieures \u00e0 10.0.26100.4188",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5854",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27769",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5965",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7314",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3745",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25522",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23279",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Security App versions ant\u00e9rieures \u00e0 1000.27840.0.1000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27729",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22577",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8066",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5472",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-33073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33073"
},
{
"name": "CVE-2025-24068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24068"
},
{
"name": "CVE-2025-33071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33071"
},
{
"name": "CVE-2025-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33061"
},
{
"name": "CVE-2025-32720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32720"
},
{
"name": "CVE-2025-32713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32713"
},
{
"name": "CVE-2025-33067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33067"
},
{
"name": "CVE-2025-47160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47160"
},
{
"name": "CVE-2025-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33068"
},
{
"name": "CVE-2025-33055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33055"
},
{
"name": "CVE-2025-33065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33065"
},
{
"name": "CVE-2025-32712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32712"
},
{
"name": "CVE-2025-47956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47956"
},
{
"name": "CVE-2025-32715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32715"
},
{
"name": "CVE-2025-33069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33069"
},
{
"name": "CVE-2025-47955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47955"
},
{
"name": "CVE-2025-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33053"
},
{
"name": "CVE-2025-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33070"
},
{
"name": "CVE-2025-32721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32721"
},
{
"name": "CVE-2025-33062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33062"
},
{
"name": "CVE-2025-32722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32722"
},
{
"name": "CVE-2025-33052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33052"
},
{
"name": "CVE-2025-32725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32725"
},
{
"name": "CVE-2025-32710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32710"
},
{
"name": "CVE-2025-47962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47962"
},
{
"name": "CVE-2025-24065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24065"
},
{
"name": "CVE-2025-33075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33075"
},
{
"name": "CVE-2025-33059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33059"
},
{
"name": "CVE-2025-33064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33064"
},
{
"name": "CVE-2025-29828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29828"
},
{
"name": "CVE-2025-32724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32724"
},
{
"name": "CVE-2025-33056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33056"
},
{
"name": "CVE-2025-33057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33057"
},
{
"name": "CVE-2025-33063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33063"
},
{
"name": "CVE-2025-47969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47969"
},
{
"name": "CVE-2025-32718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32718"
},
{
"name": "CVE-2025-32714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32714"
},
{
"name": "CVE-2025-32719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32719"
},
{
"name": "CVE-2025-33058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33058"
},
{
"name": "CVE-2025-33060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33060"
},
{
"name": "CVE-2025-33050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33050"
},
{
"name": "CVE-2025-33066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33066"
},
{
"name": "CVE-2025-32716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32716"
},
{
"name": "CVE-2025-3052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3052"
},
{
"name": "CVE-2025-24069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24069"
}
],
"initial_release_date": "2025-06-11T00:00:00",
"last_revision_date": "2025-06-11T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0499",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-33053 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32722",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32722"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32721",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32721"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47969"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32712",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33056",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33060",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33059",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33061",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33062",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33067",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33067"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24069",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24069"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33075",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33071",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33071"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24068",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33068",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33068"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33053",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33050",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33050"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47955",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24065",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47962",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47962"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32718",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32718"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33052",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33052"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32724",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-3052",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3052"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33057",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32710",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32713",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32716",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33073",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47160",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47160"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32725",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32725"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29828",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33069",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33069"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33058",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33065",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32715",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33064",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33063",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33055",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33066",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47956",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32719",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32714",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33070",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070"
}
]
}
CERTFR-2025-AVI-0288
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que la vulnérabilité CVE-2025-29824 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7970 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7137 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5737 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22523 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.3775 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7137 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.7970 | ||
| Microsoft | Windows | Windows App Client pour Windows Desktop versions antérieures à 2.0.379.0 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5191 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5737 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.3775 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.3775 | ||
| Microsoft | Windows | Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6081.0 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23220 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23220 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7970 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Admin Center versions antérieures à 2.4.2.1 | ||
| Microsoft | Windows | Windows Admin Center in Azure Portal versions antérieures à 0.45.0.0 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5191 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23220 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5191 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25423 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7970 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.3454 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3454 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7137 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5737 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27670 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5737 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23220 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27670 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22523 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5737 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25423 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5737 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.3775 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1551 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7137 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5191 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7970",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7137",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5737",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22523",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.3775",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7137",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7970",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.379.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5737",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6081.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23220",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23220",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7970",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Admin Center versions ant\u00e9rieures \u00e0 2.4.2.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Admin Center in Azure Portal versions ant\u00e9rieures \u00e0 0.45.0.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5191",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23220",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25423",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7970",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3454",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3454",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7137",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5737",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27670",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5737",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23220",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27670",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22523",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5737",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25423",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5737",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1551",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7137",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26641"
},
{
"name": "CVE-2025-21221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21221"
},
{
"name": "CVE-2025-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26670"
},
{
"name": "CVE-2025-26669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26669"
},
{
"name": "CVE-2025-26666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26666"
},
{
"name": "CVE-2025-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26647"
},
{
"name": "CVE-2025-26680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26680"
},
{
"name": "CVE-2025-26668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26668"
},
{
"name": "CVE-2025-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26672"
},
{
"name": "CVE-2025-21191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21191"
},
{
"name": "CVE-2025-27482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27482"
},
{
"name": "CVE-2025-27469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27469"
},
{
"name": "CVE-2025-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26676"
},
{
"name": "CVE-2025-27737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27737"
},
{
"name": "CVE-2025-26688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26688"
},
{
"name": "CVE-2025-21174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21174"
},
{
"name": "CVE-2025-27474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27474"
},
{
"name": "CVE-2025-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26686"
},
{
"name": "CVE-2025-26667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26667"
},
{
"name": "CVE-2025-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26674"
},
{
"name": "CVE-2025-24058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24058"
},
{
"name": "CVE-2025-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26648"
},
{
"name": "CVE-2025-27735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27735"
},
{
"name": "CVE-2025-26673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26673"
},
{
"name": "CVE-2025-27471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27471"
},
{
"name": "CVE-2025-27492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27492"
},
{
"name": "CVE-2025-27470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27470"
},
{
"name": "CVE-2025-27472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27472"
},
{
"name": "CVE-2025-26639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26639"
},
{
"name": "CVE-2025-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26637"
},
{
"name": "CVE-2025-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21203"
},
{
"name": "CVE-2025-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26644"
},
{
"name": "CVE-2025-29810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29810"
},
{
"name": "CVE-2025-27485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27485"
},
{
"name": "CVE-2025-29808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29808"
},
{
"name": "CVE-2025-27732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27732"
},
{
"name": "CVE-2025-27479",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27479"
},
{
"name": "CVE-2025-21205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21205"
},
{
"name": "CVE-2025-27739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27739"
},
{
"name": "CVE-2025-27491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27491"
},
{
"name": "CVE-2025-27480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27480"
},
{
"name": "CVE-2025-27484",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27484"
},
{
"name": "CVE-2025-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26665"
},
{
"name": "CVE-2025-27475",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27475"
},
{
"name": "CVE-2025-24060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24060"
},
{
"name": "CVE-2025-27483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27483"
},
{
"name": "CVE-2025-27738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27738"
},
{
"name": "CVE-2025-27731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27731"
},
{
"name": "CVE-2025-27476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27476"
},
{
"name": "CVE-2025-29812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29812"
},
{
"name": "CVE-2025-27728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27728"
},
{
"name": "CVE-2025-27733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27733"
},
{
"name": "CVE-2025-27729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27729"
},
{
"name": "CVE-2025-21204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21204"
},
{
"name": "CVE-2025-24062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24062"
},
{
"name": "CVE-2025-27740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27740"
},
{
"name": "CVE-2025-24073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24073"
},
{
"name": "CVE-2025-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26649"
},
{
"name": "CVE-2025-27741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27741"
},
{
"name": "CVE-2025-27481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27481"
},
{
"name": "CVE-2025-26651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26651"
},
{
"name": "CVE-2025-27486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27486"
},
{
"name": "CVE-2025-24074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24074"
},
{
"name": "CVE-2025-21222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21222"
},
{
"name": "CVE-2025-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26671"
},
{
"name": "CVE-2025-29819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29819"
},
{
"name": "CVE-2025-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26663"
},
{
"name": "CVE-2025-27473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27473"
},
{
"name": "CVE-2025-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29824"
},
{
"name": "CVE-2025-26652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26652"
},
{
"name": "CVE-2025-27736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27736"
},
{
"name": "CVE-2025-27467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27467"
},
{
"name": "CVE-2025-27487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27487"
},
{
"name": "CVE-2025-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26664"
},
{
"name": "CVE-2025-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26678"
},
{
"name": "CVE-2025-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26635"
},
{
"name": "CVE-2025-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26681"
},
{
"name": "CVE-2025-27477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27477"
},
{
"name": "CVE-2025-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26675"
},
{
"name": "CVE-2025-27490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27490"
},
{
"name": "CVE-2025-26687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26687"
},
{
"name": "CVE-2025-27730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27730"
},
{
"name": "CVE-2025-27742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27742"
},
{
"name": "CVE-2025-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21197"
},
{
"name": "CVE-2025-27727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27727"
},
{
"name": "CVE-2025-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26679"
},
{
"name": "CVE-2025-26640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26640"
},
{
"name": "CVE-2025-29809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29809"
},
{
"name": "CVE-2025-27478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27478"
},
{
"name": "CVE-2025-29811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29811"
}
],
"initial_release_date": "2025-04-09T00:00:00",
"last_revision_date": "2025-04-09T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0288",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-29824 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26637",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26637"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27492",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27492"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27478",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27478"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27480",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27480"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27483",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27483"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21203",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21203"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26647",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26647"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27467",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27467"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27469",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27469"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27479",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27479"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21191",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21191"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26668",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26668"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26672",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26672"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27486",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27486"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26665",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26665"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27736",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27736"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21197",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21197"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27485",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27485"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24073",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24073"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26678",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26678"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26669",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26669"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24074",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24074"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26687",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26687"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27474",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27474"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27731"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27491",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27481",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21204",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26680",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26680"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26681",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26681"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27484",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27484"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27476",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27476"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27737",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27737"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27733",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27733"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26671",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26671"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26676",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26676"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26686",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26686"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24060",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24060"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26663",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26663"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29810",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29810"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26667",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26667"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27739",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27739"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26688",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26688"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29811",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29811"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26651",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26651"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27471",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27471"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21221",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21221"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26664",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26664"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27741",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27741"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26649",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26649"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26679",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26679"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27728",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27728"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24062",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24062"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24058",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24058"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21174",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21174"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26640",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26640"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27472",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27472"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29809",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29809"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21222",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21222"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29819",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29819"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27473",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27473"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26641",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26641"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26648",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26648"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27738",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27738"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26652",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26652"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27490",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27490"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26674",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26674"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26644",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26644"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27470",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27470"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29824",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26666",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26666"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26635",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27742",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27742"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26673",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26673"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26670",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26670"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27477",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27477"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27475",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27475"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27732",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27740",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27740"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29812",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29812"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21205",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21205"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29808",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29808"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27482",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27482"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27487",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27735",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27735"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26675",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26675"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26639",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26639"
},
{
"published_at": "2025-04-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27730",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27730"
}
]
}
CERTFR-2025-AVI-0048
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Microsoft Windows. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.2894 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5371 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.2894 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.2894 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5371 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4751 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5371 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5371 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.4751 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.4751 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5371 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.4751 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5371 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.4751",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.4751",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-21325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21325"
}
],
"initial_release_date": "2025-01-17T00:00:00",
"last_revision_date": "2025-01-17T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-17T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-01-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21325",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21325"
}
]
}
CERTFR-2025-AVI-0039
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que les vulnérabilités CVE-2025-21333, CVE-2025-21334 et CVE-2025-21335 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22371 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.2894 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.2894 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23070 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.6775 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.007 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25273 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5371 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7699 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7699 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.007 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.007 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.2894 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23070 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.6775 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.6775 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.2894 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5371 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4751 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 1.003 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23070 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.007 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3091 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4751 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 1.003 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.6775 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 1.002 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.003 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.3091 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5371 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5371 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.4751 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.4751 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25273 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1369 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.7699 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20890 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27520 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5371 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.002 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27520 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7699 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.003 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23070 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20890 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22371 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5371 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.2894",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23070",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.6775",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.007",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25273",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7699",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7699",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.007",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.007",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23070",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.6775",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.6775",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23070",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.007",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3091",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.6775",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.002",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3091",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.4751",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25273",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1369",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7699",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20890",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27520",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.002",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27520",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7699",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23070",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20890",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5371",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-21220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21220"
},
{
"name": "CVE-2025-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21245"
},
{
"name": "CVE-2025-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21231"
},
{
"name": "CVE-2025-21242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21242"
},
{
"name": "CVE-2025-21285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21285"
},
{
"name": "CVE-2025-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21413"
},
{
"name": "CVE-2025-21334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21334"
},
{
"name": "CVE-2025-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21296"
},
{
"name": "CVE-2025-21223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21223"
},
{
"name": "CVE-2025-21321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21321"
},
{
"name": "CVE-2025-21331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21331"
},
{
"name": "CVE-2025-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21248"
},
{
"name": "CVE-2025-21278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21278"
},
{
"name": "CVE-2025-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21303"
},
{
"name": "CVE-2025-21326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21326"
},
{
"name": "CVE-2025-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21210"
},
{
"name": "CVE-2025-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21218"
},
{
"name": "CVE-2025-21251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21251"
},
{
"name": "CVE-2025-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21372"
},
{
"name": "CVE-2025-21323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21323"
},
{
"name": "CVE-2025-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21240"
},
{
"name": "CVE-2025-21317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21317"
},
{
"name": "CVE-2025-21318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21318"
},
{
"name": "CVE-2025-21176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21176"
},
{
"name": "CVE-2025-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21374"
},
{
"name": "CVE-2025-21389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21389"
},
{
"name": "CVE-2025-21263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21263"
},
{
"name": "CVE-2025-21315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21315"
},
{
"name": "CVE-2025-21319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21319"
},
{
"name": "CVE-2025-21280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21280"
},
{
"name": "CVE-2025-21298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21298"
},
{
"name": "CVE-2025-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21239"
},
{
"name": "CVE-2024-7344",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7344"
},
{
"name": "CVE-2025-21266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21266"
},
{
"name": "CVE-2025-21332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21332"
},
{
"name": "CVE-2025-21274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21274"
},
{
"name": "CVE-2025-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21249"
},
{
"name": "CVE-2025-21189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21189"
},
{
"name": "CVE-2025-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21301"
},
{
"name": "CVE-2025-21309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21309"
},
{
"name": "CVE-2025-21268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21268"
},
{
"name": "CVE-2025-21310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21310"
},
{
"name": "CVE-2025-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21290"
},
{
"name": "CVE-2025-21287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21287"
},
{
"name": "CVE-2025-21234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21234"
},
{
"name": "CVE-2025-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21417"
},
{
"name": "CVE-2025-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21171"
},
{
"name": "CVE-2025-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21293"
},
{
"name": "CVE-2025-21275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21275"
},
{
"name": "CVE-2025-21225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21225"
},
{
"name": "CVE-2025-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21244"
},
{
"name": "CVE-2025-21228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21228"
},
{
"name": "CVE-2025-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21271"
},
{
"name": "CVE-2025-21307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21307"
},
{
"name": "CVE-2025-21316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21316"
},
{
"name": "CVE-2025-21255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21255"
},
{
"name": "CVE-2025-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21378"
},
{
"name": "CVE-2025-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21299"
},
{
"name": "CVE-2025-21330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21330"
},
{
"name": "CVE-2025-21224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21224"
},
{
"name": "CVE-2025-21211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21211"
},
{
"name": "CVE-2025-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21235"
},
{
"name": "CVE-2025-21277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21277"
},
{
"name": "CVE-2025-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21270"
},
{
"name": "CVE-2025-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21339"
},
{
"name": "CVE-2025-21333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21333"
},
{
"name": "CVE-2025-21257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21257"
},
{
"name": "CVE-2025-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21370"
},
{
"name": "CVE-2025-21227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21227"
},
{
"name": "CVE-2025-21324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21324"
},
{
"name": "CVE-2025-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21256"
},
{
"name": "CVE-2025-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21304"
},
{
"name": "CVE-2025-21215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21215"
},
{
"name": "CVE-2025-21327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21327"
},
{
"name": "CVE-2025-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21236"
},
{
"name": "CVE-2025-21202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21202"
},
{
"name": "CVE-2025-21214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21214"
},
{
"name": "CVE-2025-21273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21273"
},
{
"name": "CVE-2025-21311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21311"
},
{
"name": "CVE-2025-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21243"
},
{
"name": "CVE-2025-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21297"
},
{
"name": "CVE-2025-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21213"
},
{
"name": "CVE-2025-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21291"
},
{
"name": "CVE-2025-21276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21276"
},
{
"name": "CVE-2025-21260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21260"
},
{
"name": "CVE-2025-21320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21320"
},
{
"name": "CVE-2025-21258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21258"
},
{
"name": "CVE-2025-21411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21411"
},
{
"name": "CVE-2025-21292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21292"
},
{
"name": "CVE-2025-21281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21281"
},
{
"name": "CVE-2025-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21238"
},
{
"name": "CVE-2025-21284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21284"
},
{
"name": "CVE-2025-21229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21229"
},
{
"name": "CVE-2025-21306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21306"
},
{
"name": "CVE-2025-21336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21336"
},
{
"name": "CVE-2025-21338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21338"
},
{
"name": "CVE-2025-21313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21313"
},
{
"name": "CVE-2025-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21343"
},
{
"name": "CVE-2025-21329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21329"
},
{
"name": "CVE-2025-21335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21335"
},
{
"name": "CVE-2025-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21302"
},
{
"name": "CVE-2025-21314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21314"
},
{
"name": "CVE-2025-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21207"
},
{
"name": "CVE-2025-21289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21289"
},
{
"name": "CVE-2025-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21272"
},
{
"name": "CVE-2025-21288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21288"
},
{
"name": "CVE-2025-21246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21246"
},
{
"name": "CVE-2025-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21193"
},
{
"name": "CVE-2025-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21219"
},
{
"name": "CVE-2025-21409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21409"
},
{
"name": "CVE-2025-21252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21252"
},
{
"name": "CVE-2025-21269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21269"
},
{
"name": "CVE-2025-21382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21382"
},
{
"name": "CVE-2025-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21282"
},
{
"name": "CVE-2025-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21294"
},
{
"name": "CVE-2025-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21217"
},
{
"name": "CVE-2025-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21237"
},
{
"name": "CVE-2025-21328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21328"
},
{
"name": "CVE-2025-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21305"
},
{
"name": "CVE-2025-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21233"
},
{
"name": "CVE-2025-21286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21286"
},
{
"name": "CVE-2025-21261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21261"
},
{
"name": "CVE-2025-21300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21300"
},
{
"name": "CVE-2025-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21232"
},
{
"name": "CVE-2025-21172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21172"
},
{
"name": "CVE-2025-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21226"
},
{
"name": "CVE-2025-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21295"
},
{
"name": "CVE-2025-21250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21250"
},
{
"name": "CVE-2025-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21230"
},
{
"name": "CVE-2025-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21340"
},
{
"name": "CVE-2025-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21265"
},
{
"name": "CVE-2025-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21341"
},
{
"name": "CVE-2025-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21241"
},
{
"name": "CVE-2025-21312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21312"
},
{
"name": "CVE-2025-21308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21308"
}
],
"initial_release_date": "2025-01-15T00:00:00",
"last_revision_date": "2025-01-15T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0039",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2025-21333, CVE-2025-21334 et CVE-2025-21335 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21249",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21249"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21244"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21300",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21300"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21276",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21340",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21340"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21189",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21287"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21382"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21248",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21248"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21295",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21310",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21310"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21246",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21246"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21255",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21218",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21218"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21294",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21250",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21250"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21321",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21321"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21305",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21305"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21220",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21260",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21338",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21214",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21223",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21171",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21372",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21372"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21304",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21304"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21241",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21241"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21252",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21252"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21327",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21299",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21323",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21323"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21378",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21378"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21411",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21258",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21275",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21281",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21282",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21302",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21302"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21202",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21202"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21314",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21239",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21239"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21224",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21224"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21290",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21290"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21228",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21242",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-7344",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7344"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21176",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21225",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21225"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21284"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21330",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21330"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21318",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21318"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21409",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21331",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21232",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21232"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21263",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21272",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21413",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21293",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21293"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21193",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21193"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21236",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21296",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21234"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21341",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21341"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21285",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21285"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21213",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21213"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21243",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21243"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21308",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21312",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21312"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21245",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21233",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21233"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21251",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21251"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21207",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21207"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21227",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21237",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21237"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21215",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21374",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21374"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21315",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21333",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21339",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21339"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21326",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21326"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21269",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21288",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21288"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21343",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21343"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21257",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21257"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21271",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21271"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21306",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21306"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21389",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21389"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21370",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21370"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21291",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21291"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21270",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21229",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21229"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21266",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21238",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21238"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21301",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21301"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21311",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21336",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21217",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21317",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21317"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21329",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21332",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21332"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21273",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21256",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21328",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21335",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21231",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21240",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21240"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21292",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21292"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21226",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21261",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21297",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21319",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21303",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21303"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21417",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21235",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21235"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21274",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21274"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21211"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21210",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21320",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21313",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21172",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21219",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21268",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21307",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21286",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21286"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21278",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21278"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21280",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21280"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21298",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21316",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21316"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21265",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265"
},
{
"published_at": "2025-01-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21309",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21309"
}
]
}
CERTFR-2024-AVI-0975
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que les vulnérabilités CVE-2024-43451 et CVE-2024-49039 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22267 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27415 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 1.001 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.001 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22966 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.2849 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25165 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5131 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5131 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.4460 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.6532 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5131 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27415 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.7515 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25165 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.4460 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7515 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20826 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.4460 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22966 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20826 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.2849 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.2240 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1251 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22966 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5131 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.2240 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22267 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5131 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7515 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22966 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4460 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.001 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.2240 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5131 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.6532 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.6532 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.2240 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7515 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.6532 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.001 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22267",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27415",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22966",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.2849",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25165",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5131",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5131",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.4460",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.6532",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5131",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27415",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7515",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25165",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.4460",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7515",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20826",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.4460",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22966",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20826",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.2849",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.2240",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1251",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22966",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5131",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.2240",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22267",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5131",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7515",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22966",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4460",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.2240",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5131",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.6532",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.6532",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.2240",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7515",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.6532",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-43628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43628"
},
{
"name": "CVE-2024-43640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43640"
},
{
"name": "CVE-2024-43627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43627"
},
{
"name": "CVE-2024-43620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43620"
},
{
"name": "CVE-2024-43626",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43626"
},
{
"name": "CVE-2024-43622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43622"
},
{
"name": "CVE-2024-43630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43630"
},
{
"name": "CVE-2024-49019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49019"
},
{
"name": "CVE-2024-43631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43631"
},
{
"name": "CVE-2024-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38203"
},
{
"name": "CVE-2024-43449",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43449"
},
{
"name": "CVE-2024-49039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49039"
},
{
"name": "CVE-2024-43639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43639"
},
{
"name": "CVE-2024-43638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43638"
},
{
"name": "CVE-2024-43621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43621"
},
{
"name": "CVE-2024-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38264"
},
{
"name": "CVE-2024-43629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43629"
},
{
"name": "CVE-2024-43450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43450"
},
{
"name": "CVE-2024-43637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43637"
},
{
"name": "CVE-2024-49046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49046"
},
{
"name": "CVE-2024-43623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43623"
},
{
"name": "CVE-2024-43643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43643"
},
{
"name": "CVE-2024-43624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43624"
},
{
"name": "CVE-2024-43452",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43452"
},
{
"name": "CVE-2024-43633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43633"
},
{
"name": "CVE-2024-43530",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43530"
},
{
"name": "CVE-2024-43636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43636"
},
{
"name": "CVE-2024-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43642"
},
{
"name": "CVE-2024-43644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43644"
},
{
"name": "CVE-2024-43447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43447"
},
{
"name": "CVE-2024-43635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43635"
},
{
"name": "CVE-2024-43625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43625"
},
{
"name": "CVE-2024-43641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43641"
},
{
"name": "CVE-2024-43451",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43451"
},
{
"name": "CVE-2024-43645",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43645"
},
{
"name": "CVE-2024-43646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43646"
},
{
"name": "CVE-2024-43634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43634"
}
],
"initial_release_date": "2024-11-13T00:00:00",
"last_revision_date": "2024-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0975",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2024-43451 et CVE-2024-49039 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43646",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43646"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43449",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43628",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43628"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43644",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43644"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43620",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43620"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-49046",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49046"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43638",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43638"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43642",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43642"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43625",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43625"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43645",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43645"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43641",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43641"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43637",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43637"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43633",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43633"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43447",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43447"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43639",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43639"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43636",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43636"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38264",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38264"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43635",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43635"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43634",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43634"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43626",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43626"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43629",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43629"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43624",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43624"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43643",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43643"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43451",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43530",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43530"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43621",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43621"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-49019",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49019"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-49039",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49039"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43640",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43640"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43452",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43452"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43631",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43631"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43630",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43630"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38203",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38203"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43622",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43622"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43627",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43627"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43623",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43623"
},
{
"published_at": "2024-11-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43450",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450"
}
]
}
CERTFR-2024-AVI-0854
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que les vulnérabilités CVE-2024-43572 et CVE-2024-43573 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.4317 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.2033 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25118 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.4317 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27366 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.7428 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7428 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22221 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7428 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5011 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22918 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.6414 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20796 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22221 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348..2762 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4317 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.6414 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5011 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348..2762 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20796 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1189 | ||
| Microsoft | Windows | Remote Desktop client pour Windows Desktop versions antérieures à 1.2.5709.0 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.6414 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.6414 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5011 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7428 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.2033 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22918 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25118 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27366 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 antérieures à 10.0.22000.3260 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5011 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22918 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5011 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22918 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 antérieures à 10.0.22000.3260 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.4317 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5011 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.4317",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.2033",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25118",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.4317",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27366",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7428",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7428",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22221",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7428",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5011",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22918",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.6414",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20796",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22221",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348..2762",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4317",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.6414",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5011",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348..2762",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20796",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1189",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.5709.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.6414",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.6414",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5011",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7428",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.2033",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22918",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25118",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27366",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64 ant\u00e9rieures \u00e0 10.0.22000.3260",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5011",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22918",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5011",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22918",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64 ant\u00e9rieures \u00e0 10.0.22000.3260",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.4317",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5011",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-43542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43542"
},
{
"name": "CVE-2024-43582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43582"
},
{
"name": "CVE-2024-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37983"
},
{
"name": "CVE-2024-43533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43533"
},
{
"name": "CVE-2024-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38265"
},
{
"name": "CVE-2024-43535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43535"
},
{
"name": "CVE-2024-20659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20659"
},
{
"name": "CVE-2024-43583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43583"
},
{
"name": "CVE-2024-43565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43565"
},
{
"name": "CVE-2024-43555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43555"
},
{
"name": "CVE-2024-30092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30092"
},
{
"name": "CVE-2024-43563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43563"
},
{
"name": "CVE-2024-43508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43508"
},
{
"name": "CVE-2024-43543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43543"
},
{
"name": "CVE-2024-43572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43572"
},
{
"name": "CVE-2024-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38029"
},
{
"name": "CVE-2024-43513",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43513"
},
{
"name": "CVE-2024-43561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43561"
},
{
"name": "CVE-2024-43573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43573"
},
{
"name": "CVE-2024-43585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43585"
},
{
"name": "CVE-2024-43509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43509"
},
{
"name": "CVE-2024-43592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43592"
},
{
"name": "CVE-2024-43524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43524"
},
{
"name": "CVE-2024-43522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43522"
},
{
"name": "CVE-2024-43558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43558"
},
{
"name": "CVE-2024-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37979"
},
{
"name": "CVE-2024-43562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43562"
},
{
"name": "CVE-2024-43516",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43516"
},
{
"name": "CVE-2024-43514",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43514"
},
{
"name": "CVE-2024-43512",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43512"
},
{
"name": "CVE-2024-43515",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43515"
},
{
"name": "CVE-2024-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38129"
},
{
"name": "CVE-2024-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37982"
},
{
"name": "CVE-2024-43556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43556"
},
{
"name": "CVE-2024-43574",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43574"
},
{
"name": "CVE-2024-43593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43593"
},
{
"name": "CVE-2024-43523",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43523"
},
{
"name": "CVE-2024-43581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43581"
},
{
"name": "CVE-2024-43554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43554"
},
{
"name": "CVE-2024-43559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43559"
},
{
"name": "CVE-2024-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43552"
},
{
"name": "CVE-2024-43532",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43532"
},
{
"name": "CVE-2024-43537",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43537"
},
{
"name": "CVE-2024-43506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43506"
},
{
"name": "CVE-2024-43546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43546"
},
{
"name": "CVE-2024-43575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43575"
},
{
"name": "CVE-2024-43500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43500"
},
{
"name": "CVE-2024-43549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43549"
},
{
"name": "CVE-2024-43521",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43521"
},
{
"name": "CVE-2024-43518",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43518"
},
{
"name": "CVE-2024-43534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43534"
},
{
"name": "CVE-2024-43544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43544"
},
{
"name": "CVE-2024-43538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43538"
},
{
"name": "CVE-2024-43545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43545"
},
{
"name": "CVE-2024-43525",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43525"
},
{
"name": "CVE-2024-43599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43599"
},
{
"name": "CVE-2024-43560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43560"
},
{
"name": "CVE-2024-43607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43607"
},
{
"name": "CVE-2024-43608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43608"
},
{
"name": "CVE-2024-43536",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43536"
},
{
"name": "CVE-2024-43502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43502"
},
{
"name": "CVE-2024-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43551"
},
{
"name": "CVE-2024-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38149"
},
{
"name": "CVE-2024-43567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43567"
},
{
"name": "CVE-2024-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38262"
},
{
"name": "CVE-2024-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43527"
},
{
"name": "CVE-2024-43520",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43520"
},
{
"name": "CVE-2024-43564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43564"
},
{
"name": "CVE-2024-43453",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43453"
},
{
"name": "CVE-2024-43589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43589"
},
{
"name": "CVE-2024-43553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43553"
},
{
"name": "CVE-2024-43615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43615"
},
{
"name": "CVE-2024-43526",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43526"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2024-43571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43571"
},
{
"name": "CVE-2024-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38124"
},
{
"name": "CVE-2024-43547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43547"
},
{
"name": "CVE-2024-43456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43456"
},
{
"name": "CVE-2024-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38261"
},
{
"name": "CVE-2024-43557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43557"
},
{
"name": "CVE-2024-43528",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43528"
},
{
"name": "CVE-2024-43501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43501"
},
{
"name": "CVE-2024-43584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43584"
},
{
"name": "CVE-2024-43541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43541"
},
{
"name": "CVE-2024-43517",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43517"
},
{
"name": "CVE-2024-43519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43519"
},
{
"name": "CVE-2024-43540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43540"
},
{
"name": "CVE-2024-37976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37976"
},
{
"name": "CVE-2024-43550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43550"
},
{
"name": "CVE-2024-43570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43570"
},
{
"name": "CVE-2024-43511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43511"
},
{
"name": "CVE-2024-43611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43611"
},
{
"name": "CVE-2024-43529",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43529"
},
{
"name": "CVE-2024-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38212"
}
],
"initial_release_date": "2024-10-09T00:00:00",
"last_revision_date": "2024-10-09T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0854",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2024-43572 et CVE-2024-43573 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43562",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43562"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38262",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38262"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43521",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43521"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43511",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43511"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43565",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43565"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43538",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43538"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43556",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43556"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43518",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43518"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43554",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43554"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43599",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43599"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43542",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43542"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43608",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43608"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43575",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43575"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43534",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43534"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43527",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43527"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43551",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43551"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43541",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43541"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43552",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43552"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38149",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38149"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37976",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37976"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43582",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43582"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43553",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43553"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43555",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43555"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43549",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43549"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43615",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43615"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43522",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43522"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43515",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43515"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43536",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43536"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43593",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43593"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43547",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43547"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43564",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43564"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43517",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43517"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43508",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43508"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38261",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38261"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43520",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43520"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43524",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43524"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38129",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38129"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43581",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43581"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30092",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30092"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43456",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43456"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38124",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38124"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43558",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43558"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43544",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43544"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43545",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43545"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43500",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43500"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43525",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43525"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43573",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43573"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37979",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37979"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43567",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43567"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43506",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43506"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43572",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43572"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43546",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43546"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43509",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43509"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43533",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43533"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43529",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43529"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43563",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43563"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43559",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43559"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43502",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43502"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37982",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37982"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43512",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43512"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38265",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38265"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38029",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38029"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43519",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43519"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43557",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43557"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-6197",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6197"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43560",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43560"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43561",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43561"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43543",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43543"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43513",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43513"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43453",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43453"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43607",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43607"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43514",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43514"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43585",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43585"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43571",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43571"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43583",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43583"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43537",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43537"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43589",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43589"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43550",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43550"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43540",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43540"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-20659",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20659"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43501",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43501"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38212",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38212"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43532",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43532"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43574",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43574"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43523",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43523"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43535",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43535"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43570",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43570"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-37983",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37983"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43584",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43584"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43611",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43611"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43516",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43516"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43528",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43528"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43592",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43592"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43526",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43526"
}
]
}
CERTFR-2024-AVI-0660
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur précise que les correctifs ne sont pas disponibles pour le moment. Veuillez-vous référer au bulletin de sécurité de l'éditeur pour l'obtention des recommandations et des mesures de détection.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "L\u0027\u00e9diteur pr\u00e9cise que les correctifs ne sont pas disponibles pour le moment. Veuillez-vous r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des recommandations et des mesures de d\u00e9tection.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21302"
},
{
"name": "CVE-2024-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38202"
}
],
"initial_release_date": "2024-08-08T00:00:00",
"last_revision_date": "2024-08-08T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0660",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-08T00:00:00.000000"
},
{
"description": "Ajout d\u0027une pr\u00e9cision concernant les correctifs",
"revision_date": "2024-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2024-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38202",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202"
},
{
"published_at": "2024-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-21302",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21302"
}
]
}
CERTFR-2024-AVI-0400
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.3593 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22668 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 versions antérieures à 10.0.22000.2960 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.24868 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.2458 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22668 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27117 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27117 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 versions antérieures à 10.0.17763.5820 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.3593 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20651 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22668 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22668 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.6981 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.4412 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 versions antérieures à 10.0.22000.2960 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.4412 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.6981 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.24868 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3593 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.6981 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.887 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.5820 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.21972 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20651 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.4412 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.3593 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.4412 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.5820 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.6981 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.21972 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.4412 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.5820 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.5820 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.2458 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.4412 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.3593",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22668",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22000.2960",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.24868",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.2458",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22668",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27117",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27117",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.17763.5820",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.3593",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20651",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22668",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22668",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.6981",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.4412",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22000.2960",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.4412",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.6981",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.24868",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3593",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.6981",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.887",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.5820",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.21972",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20651",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.4412",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.3593",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.4412",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.5820",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.6981",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.21972",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.4412",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.5820",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.5820",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.2458",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.4412",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-30032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30032"
},
{
"name": "CVE-2024-30017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30017"
},
{
"name": "CVE-2024-29994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29994"
},
{
"name": "CVE-2024-30006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30006"
},
{
"name": "CVE-2024-30011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30011"
},
{
"name": "CVE-2024-30034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30034"
},
{
"name": "CVE-2024-30028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30028"
},
{
"name": "CVE-2024-30019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30019"
},
{
"name": "CVE-2024-30039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30039"
},
{
"name": "CVE-2024-30022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30022"
},
{
"name": "CVE-2024-30020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30020"
},
{
"name": "CVE-2024-30029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30029"
},
{
"name": "CVE-2024-30025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30025"
},
{
"name": "CVE-2024-30021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30021"
},
{
"name": "CVE-2024-30004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30004"
},
{
"name": "CVE-2024-29997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29997"
},
{
"name": "CVE-2024-30040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30040"
},
{
"name": "CVE-2024-29996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29996"
},
{
"name": "CVE-2024-30009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30009"
},
{
"name": "CVE-2024-30003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30003"
},
{
"name": "CVE-2024-30014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30014"
},
{
"name": "CVE-2024-26238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26238"
},
{
"name": "CVE-2024-30051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30051"
},
{
"name": "CVE-2024-30049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30049"
},
{
"name": "CVE-2024-30010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30010"
},
{
"name": "CVE-2024-29999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29999"
},
{
"name": "CVE-2024-30038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30038"
},
{
"name": "CVE-2024-30005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30005"
},
{
"name": "CVE-2024-30027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30027"
},
{
"name": "CVE-2024-30033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30033"
},
{
"name": "CVE-2024-30001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30001"
},
{
"name": "CVE-2024-30036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30036"
},
{
"name": "CVE-2024-30000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30000"
},
{
"name": "CVE-2024-30031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30031"
},
{
"name": "CVE-2024-30008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30008"
},
{
"name": "CVE-2024-30030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30030"
},
{
"name": "CVE-2024-30012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30012"
},
{
"name": "CVE-2024-30023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30023"
},
{
"name": "CVE-2024-30035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30035"
},
{
"name": "CVE-2024-30037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30037"
},
{
"name": "CVE-2024-30015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30015"
},
{
"name": "CVE-2024-30007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30007"
},
{
"name": "CVE-2024-30024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30024"
},
{
"name": "CVE-2024-30016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30016"
},
{
"name": "CVE-2024-30002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30002"
},
{
"name": "CVE-2024-30050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30050"
},
{
"name": "CVE-2024-30018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30018"
},
{
"name": "CVE-2024-29998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29998"
}
],
"initial_release_date": "2024-05-15T00:00:00",
"last_revision_date": "2024-05-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0400",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29994 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29994"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30049 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30049"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30002 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30025 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30025"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30008 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30008"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30009 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30021 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30021"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30037 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30037"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30017 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30017"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30011 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30011"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30050 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30005 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30005"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30029 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30029"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30019 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30019"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30032 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30032"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30015 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30015"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30024 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30024"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26238 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26238"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30033 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30033"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29996 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29996"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30012 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30012"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30038 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30038"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30001 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30001"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30039 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30039"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29998 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29998"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30006 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30003 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30003"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30018 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30018"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30022 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30022"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30010 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30010"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30040 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30020 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30020"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30035 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30035"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30027 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30027"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30030 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30030"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30000 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30000"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30028 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30028"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30014 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29997 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29997"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30007 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30007"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30023 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30023"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30016 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30016"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30004 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30036 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30036"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29999 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29999"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30031 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30031"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30051 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-30034 du 14 mai 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30034"
}
]
}
CERTFR-2024-AVI-0370
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Apple iTunes. Elle permet à un attaquant de provoquer une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iTunes pour Windows versions ant\u00e9rieures \u00e0 12.13.2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-27793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27793"
}
],
"initial_release_date": "2024-05-10T00:00:00",
"last_revision_date": "2024-05-10T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0370",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans\u003cspan class=\"textit\"\u003e Apple\niTunes\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire et un d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans iTunes pour Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT214099 du 08 mai 2024",
"url": "https://support.apple.com/kb/HT214099"
}
]
}
CERTFR-2024-AVI-0289
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.4291 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.5696 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.830 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.4291 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.24821 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27067 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.2402 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 versions antérieures à 10.0.17763.5696 | ||
| Microsoft | Windows | Outlook pour Windows versions antérieures à 1.2023.0322.0100 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22631.3447 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27067 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22618 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.6897 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.6897 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.21924 | ||
| Microsoft | Windows | Microsoft ODBC Driver 18 pour SQL Server sur Windows versions antérieures à 18.3.3.1 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 versions antérieures à 10.0.22000.2899 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.6897 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.4291 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.24821 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 versions antérieures à 10.0.22000.2899 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.6897 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22618 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3447 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3447 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.2402 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.4291 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.21924 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22618 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.5696 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.4291 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.3447 | ||
| Microsoft | Windows | Microsoft ODBC Driver 17 pour SQL Server sur Windows versions antérieures à 17.10.6.1 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20596 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20596 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22618 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.4291 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.5696 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.3435 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.3435 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.5696 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.830",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.24821",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27067",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.2402",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Outlook pour Windows versions ant\u00e9rieures \u00e0 1.2023.0322.0100",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.3447",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27067",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22618",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.6897",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.6897",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.21924",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 18 pour SQL Server sur Windows versions ant\u00e9rieures \u00e0 18.3.3.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22000.2899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.6897",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.24821",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22000.2899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.6897",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22618",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3447",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3447",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.2402",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.21924",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22618",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.3447",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft ODBC Driver 17 pour SQL Server sur Windows versions ant\u00e9rieures \u00e0 17.10.6.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20596",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20596",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22618",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.4291",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.3435",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.3435",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.5696",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-28902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28902"
},
{
"name": "CVE-2024-26232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26232"
},
{
"name": "CVE-2024-26214",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26214"
},
{
"name": "CVE-2024-28919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28919"
},
{
"name": "CVE-2024-26239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26239"
},
{
"name": "CVE-2024-26194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26194"
},
{
"name": "CVE-2024-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26222"
},
{
"name": "CVE-2024-28933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28933"
},
{
"name": "CVE-2024-28941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28941"
},
{
"name": "CVE-2024-28925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28925"
},
{
"name": "CVE-2024-26211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26211"
},
{
"name": "CVE-2024-29066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29066"
},
{
"name": "CVE-2024-20693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20693"
},
{
"name": "CVE-2024-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26242"
},
{
"name": "CVE-2024-20688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20688"
},
{
"name": "CVE-2024-26252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26252"
},
{
"name": "CVE-2024-28896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28896"
},
{
"name": "CVE-2024-26179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26179"
},
{
"name": "CVE-2024-26227",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26227"
},
{
"name": "CVE-2024-28905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28905"
},
{
"name": "CVE-2024-20669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20669"
},
{
"name": "CVE-2024-26223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26223"
},
{
"name": "CVE-2024-28932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28932"
},
{
"name": "CVE-2024-26180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26180"
},
{
"name": "CVE-2024-28897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28897"
},
{
"name": "CVE-2024-26234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26234"
},
{
"name": "CVE-2024-21447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21447"
},
{
"name": "CVE-2024-29043",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29043"
},
{
"name": "CVE-2024-28935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28935"
},
{
"name": "CVE-2024-28930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28930"
},
{
"name": "CVE-2024-28921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28921"
},
{
"name": "CVE-2024-26253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26253"
},
{
"name": "CVE-2024-28943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28943"
},
{
"name": "CVE-2024-29064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29064"
},
{
"name": "CVE-2024-28901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28901"
},
{
"name": "CVE-2024-26243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26243"
},
{
"name": "CVE-2024-29062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29062"
},
{
"name": "CVE-2024-26195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26195"
},
{
"name": "CVE-2024-26231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26231"
},
{
"name": "CVE-2024-26213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26213"
},
{
"name": "CVE-2024-26219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26219"
},
{
"name": "CVE-2024-26168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26168"
},
{
"name": "CVE-2024-28934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28934"
},
{
"name": "CVE-2024-26175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26175"
},
{
"name": "CVE-2024-26207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26207"
},
{
"name": "CVE-2024-26210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26210"
},
{
"name": "CVE-2024-28936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28936"
},
{
"name": "CVE-2024-26171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26171"
},
{
"name": "CVE-2024-26255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26255"
},
{
"name": "CVE-2024-26189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26189"
},
{
"name": "CVE-2024-28924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28924"
},
{
"name": "CVE-2024-28907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28907"
},
{
"name": "CVE-2024-23594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23594"
},
{
"name": "CVE-2024-26215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26215"
},
{
"name": "CVE-2024-23593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23593"
},
{
"name": "CVE-2024-26202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26202"
},
{
"name": "CVE-2024-28938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28938"
},
{
"name": "CVE-2024-28904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28904"
},
{
"name": "CVE-2024-26230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26230"
},
{
"name": "CVE-2024-26235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26235"
},
{
"name": "CVE-2024-28929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28929"
},
{
"name": "CVE-2024-20670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20670"
},
{
"name": "CVE-2024-28898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28898"
},
{
"name": "CVE-2024-28920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28920"
},
{
"name": "CVE-2024-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26221"
},
{
"name": "CVE-2024-26226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26226"
},
{
"name": "CVE-2024-28931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28931"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2024-29056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29056"
},
{
"name": "CVE-2024-28900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28900"
},
{
"name": "CVE-2024-29052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29052"
},
{
"name": "CVE-2024-29988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29988"
},
{
"name": "CVE-2024-26233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26233"
},
{
"name": "CVE-2024-26229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26229"
},
{
"name": "CVE-2024-26248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26248"
},
{
"name": "CVE-2024-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26158"
},
{
"name": "CVE-2024-26250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26250"
},
{
"name": "CVE-2024-26241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26241"
},
{
"name": "CVE-2024-28923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28923"
},
{
"name": "CVE-2024-26228",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26228"
},
{
"name": "CVE-2024-26236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26236"
},
{
"name": "CVE-2024-26245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26245"
},
{
"name": "CVE-2024-28937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28937"
},
{
"name": "CVE-2024-26200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26200"
},
{
"name": "CVE-2024-26217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26217"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2024-26209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26209"
},
{
"name": "CVE-2024-29061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29061"
},
{
"name": "CVE-2024-28922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28922"
},
{
"name": "CVE-2024-26224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26224"
},
{
"name": "CVE-2024-26218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26218"
},
{
"name": "CVE-2024-26216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26216"
},
{
"name": "CVE-2024-20665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20665"
},
{
"name": "CVE-2024-20678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20678"
},
{
"name": "CVE-2024-26172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26172"
},
{
"name": "CVE-2024-26237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26237"
},
{
"name": "CVE-2024-26208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26208"
},
{
"name": "CVE-2024-26183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26183"
},
{
"name": "CVE-2024-29050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29050"
},
{
"name": "CVE-2024-26240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26240"
},
{
"name": "CVE-2024-20689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20689"
},
{
"name": "CVE-2024-26244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26244"
},
{
"name": "CVE-2024-26212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26212"
},
{
"name": "CVE-2024-28903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28903"
},
{
"name": "CVE-2024-26205",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26205"
},
{
"name": "CVE-2024-26254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26254"
},
{
"name": "CVE-2024-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26220"
}
],
"initial_release_date": "2024-04-10T00:00:00",
"last_revision_date": "2024-04-10T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26232 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26232"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29043 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29043"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28932 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28932"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28925 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28925"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26210 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26210"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29062 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29062"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26236 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26236"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26237 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26237"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26180 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26180"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28922 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28922"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29061 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29061"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28931 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28931"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21447 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21447"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26253 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26253"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26183 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26183"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26255 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26255"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28923 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28923"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26229 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26229"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26221 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26221"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-0001 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-0001"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26227 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26227"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29988 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29988"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26205 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26205"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20689 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20689"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28938 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28938"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26224 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26224"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26158 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26158"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26175 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26175"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26244 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26244"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29050 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29050"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28897 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28897"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26220 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26220"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28937 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28937"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26240 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26240"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26217 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26217"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26242 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26242"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26218 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26218"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28921 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28921"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28907 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28907"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28902 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28902"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28903 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28903"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28920 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28920"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28943 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28943"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26171 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26171"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28941 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28941"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28905 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28905"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26213 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26213"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28934 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28934"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20665 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26216 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26216"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26231 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26231"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28900 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28900"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26228 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26228"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28935 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28935"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26215 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26215"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-23593 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23593"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26214 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26214"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26248 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26248"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26254 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26254"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26226 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26226"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28930 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28930"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20693 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20693"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26208 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26208"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29056 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29066 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29066"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28896 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28896"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-23594 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-23594"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20678 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20678"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26207 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26207"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28919 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28919"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28904 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28904"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26252 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26252"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26241 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26241"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29052 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29052"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20669 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20669"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26172 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26172"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26194 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26194"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20688 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20688"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28898 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28898"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26200 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26200"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26239 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26239"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26189 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26189"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26219 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26219"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-29064 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29064"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26256 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26202 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26202"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26243 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26243"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26195 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26195"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28924 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28924"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28936 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28936"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28901 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28901"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26233 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26233"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26179 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26179"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26222 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26222"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20670 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20670"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28929 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-28933 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28933"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26250 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26250"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26230 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26230"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26168 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26168"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26211 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26211"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26209 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26209"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26234 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26234"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26212 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26212"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26223 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26223"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26235 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26235"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26245 du 09 avril 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26245"
}
],
"reference": "CERTFR-2024-AVI-0289",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows du 09 avril 2024",
"url": null
}
]
}
CERTFR-2024-AVI-0205
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.5576 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.6796 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27017 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.3296 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.5576 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.4170 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.5576 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.4170 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.4170 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.6796 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes x64 versions antérieures à 10.0.22000.2836 | ||
| Microsoft | Windows | Windows 11 version 21H2 pour systèmes ARM64 versions antérieures à 10.0.22000.2836 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.24768 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.4170 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.4170 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.3296 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.763 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.3296 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22567 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27017 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22567 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.21871 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.21871 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.4170 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22567 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes ARM64 versions antérieures à 10.0.17763.5576 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22567 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.6796 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.2333 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3296 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.24768 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20526 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.2333 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.6796 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.5576 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20526 | ||
| Microsoft | Windows | Windows Defender Antimalware Platform versions antérieures à 4.18.24010.12 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.5576",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.6796",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27017",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.3296",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.5576",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.4170",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.5576",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.4170",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.4170",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.6796",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22000.2836",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22000.2836",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.24768",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.4170",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.4170",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.3296",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.763",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.3296",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22567",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27017",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22567",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.21871",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.21871",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.4170",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22567",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.17763.5576",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22567",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.6796",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.2333",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3296",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.24768",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20526",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.2333",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.6796",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.5576",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20526",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Defender Antimalware Platform versions ant\u00e9rieures \u00e0 4.18.24010.12",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26159"
},
{
"name": "CVE-2024-26177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26177"
},
{
"name": "CVE-2024-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21437"
},
{
"name": "CVE-2024-26166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26166"
},
{
"name": "CVE-2023-28746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28746"
},
{
"name": "CVE-2024-26170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26170"
},
{
"name": "CVE-2024-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21436"
},
{
"name": "CVE-2024-26185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26185"
},
{
"name": "CVE-2024-26176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26176"
},
{
"name": "CVE-2024-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21451"
},
{
"name": "CVE-2024-21445",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21445"
},
{
"name": "CVE-2024-26160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26160"
},
{
"name": "CVE-2024-26178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26178"
},
{
"name": "CVE-2024-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21443"
},
{
"name": "CVE-2024-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21434"
},
{
"name": "CVE-2024-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21438"
},
{
"name": "CVE-2024-21407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21407"
},
{
"name": "CVE-2024-21432",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21432"
},
{
"name": "CVE-2024-21450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21450"
},
{
"name": "CVE-2024-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21444"
},
{
"name": "CVE-2024-21429",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21429"
},
{
"name": "CVE-2024-21430",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21430"
},
{
"name": "CVE-2024-26161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26161"
},
{
"name": "CVE-2024-26181",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26181"
},
{
"name": "CVE-2024-26169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26169"
},
{
"name": "CVE-2024-26173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26173"
},
{
"name": "CVE-2024-26182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26182"
},
{
"name": "CVE-2024-21431",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21431"
},
{
"name": "CVE-2024-26162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26162"
},
{
"name": "CVE-2024-21446",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21446"
},
{
"name": "CVE-2024-26174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26174"
},
{
"name": "CVE-2024-21433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21433"
},
{
"name": "CVE-2024-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21427"
},
{
"name": "CVE-2024-21408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21408"
},
{
"name": "CVE-2024-21439",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21439"
},
{
"name": "CVE-2024-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21441"
},
{
"name": "CVE-2024-21442",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21442"
},
{
"name": "CVE-2024-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21440"
},
{
"name": "CVE-2024-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21435"
},
{
"name": "CVE-2024-26190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26190"
},
{
"name": "CVE-2024-26197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26197"
},
{
"name": "CVE-2024-20671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20671"
}
],
"initial_release_date": "2024-03-13T00:00:00",
"last_revision_date": "2024-03-13T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21432 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21432"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26181 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26181"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21408 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21408"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26159 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26159"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26176 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26176"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21441 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21441"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26197 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26197"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21429 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21429"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26185 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26185"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21446 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21446"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21427 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21427"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26174 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26174"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21433 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21433"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26182 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26182"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21450 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21450"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26161 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26161"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26170 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26170"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21439 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21439"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26173 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26173"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21437 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21437"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26162 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26162"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21440 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21440"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-28746 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28746"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21444 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21444"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26178 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26178"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26169 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26169"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26190 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26160 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26160"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21434 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21434"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21431 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21431"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21430 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21430"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26166 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26166"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20671 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20671"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21438 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21438"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21451 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21451"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21442 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21442"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21445 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21445"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21407 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21407"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21443 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21443"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21435 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21435"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-26177 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26177"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21436 du 12 mars 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21436"
}
],
"reference": "CERTFR-2024-AVI-0205",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows du 12 mars 2024",
"url": null
}
]
}
CERTFR-2024-AVI-0128
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer un contournement de la fonctionnalité de sécurité, une atteinte à la confidentialité des données, un déni de service, une élévation de privilèges, une exécution de code arbitraire à distance et une usurpation d'identité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022 | ||
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2008 R2 Service Pack 1 | ||
| Microsoft | Windows | Windows 11 Version 22H2 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2008 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 180 | ||
| Microsoft | Windows | Microsoft Defender pour Endpoint pour Windows | ||
| Microsoft | Windows | Windows Server 2008 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 21H2 | ||
| Microsoft | Windows | Windows 10 Version 22H2 | ||
| Microsoft | Windows | Windows 11 Version 23H2 | ||
| Microsoft | Windows | Windows 11 version 21H2 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 180",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Defender pour Endpoint pour Windows",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21349"
},
{
"name": "CVE-2024-21369",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21369"
},
{
"name": "CVE-2024-21345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21345"
},
{
"name": "CVE-2024-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21352"
},
{
"name": "CVE-2024-21350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21350"
},
{
"name": "CVE-2024-21357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21357"
},
{
"name": "CVE-2024-21375",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21375"
},
{
"name": "CVE-2024-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21304"
},
{
"name": "CVE-2024-21356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21356"
},
{
"name": "CVE-2024-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21367"
},
{
"name": "CVE-2024-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21368"
},
{
"name": "CVE-2024-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21412"
},
{
"name": "CVE-2024-21353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21353"
},
{
"name": "CVE-2024-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21362"
},
{
"name": "CVE-2024-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21341"
},
{
"name": "CVE-2024-21406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21406"
},
{
"name": "CVE-2024-20684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20684"
},
{
"name": "CVE-2024-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21370"
},
{
"name": "CVE-2024-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21365"
},
{
"name": "CVE-2024-21391",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21391"
},
{
"name": "CVE-2024-21347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21347"
},
{
"name": "CVE-2024-21420",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21420"
},
{
"name": "CVE-2024-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21339"
},
{
"name": "CVE-2024-21343",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21343"
},
{
"name": "CVE-2024-21338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21338"
},
{
"name": "CVE-2024-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21360"
},
{
"name": "CVE-2024-21351",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21351"
},
{
"name": "CVE-2024-21361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21361"
},
{
"name": "CVE-2024-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21340"
},
{
"name": "CVE-2024-21405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21405"
},
{
"name": "CVE-2024-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21372"
},
{
"name": "CVE-2024-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21366"
},
{
"name": "CVE-2024-21315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21315"
},
{
"name": "CVE-2024-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21344"
},
{
"name": "CVE-2024-21354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21354"
},
{
"name": "CVE-2024-21346",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21346"
},
{
"name": "CVE-2024-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21342"
},
{
"name": "CVE-2024-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21358"
},
{
"name": "CVE-2024-21371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21371"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2024-21377",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21377"
},
{
"name": "CVE-2024-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21348"
},
{
"name": "CVE-2024-21363",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21363"
},
{
"name": "CVE-2024-21355",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21355"
},
{
"name": "CVE-2024-21359",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21359"
}
],
"initial_release_date": "2024-02-14T00:00:00",
"last_revision_date": "2024-02-14T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-20684 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20684"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21304 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21304"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21341 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21341"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21375 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21375"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21405 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21405"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21372 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21372"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21351 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21351"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21363 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21363"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21338 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21412 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21412"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21359 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21359"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21365 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21365"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21357 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21357"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21377 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21377"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21367 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21367"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21370 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21370"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21368 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21368"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21358 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21358"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21343 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21343"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21420 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21420"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21369 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21369"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21352 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21352"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21345 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21345"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21344 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21344"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21347 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21347"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21354 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21354"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21406 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21406"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21342 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21342"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21361 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21361"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21371 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21371"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21346 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21346"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21391 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21391"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21355 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21355"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21348 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21348"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21362 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21362"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21366 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21366"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21340 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21340"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21349 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21349"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21350 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21350"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21315 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21356 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21356"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21339 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21339"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21360 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21360"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21353 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21353"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-50387 du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387"
}
],
"reference": "CERTFR-2024-AVI-0128",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer un contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un d\u00e9ni de service, une\n\u00e9l\u00e9vation de privil\u00e8ges, une ex\u00e9cution de code arbitraire \u00e0 distance et\nune usurpation d\u0027identit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 13 f\u00e9vrier 2024",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CVE-2025-34235 (GCVE-0-2025-34235)
Vulnerability from cvelistv5
- CWE-295 - Improper Certificate Validation
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Vasion | Print Virtual Appliance Host |
Version: * ≤ |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-34235",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-30T15:04:44.186500Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-30T15:04:58.888Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-lpe-04"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"HKLM\\SOFTWARE\\PrinterLogic\\PrinterInstaller\\Overrides\\IgnoreCertificateFailures"
],
"product": "Print Virtual Appliance Host",
"vendor": "Vasion",
"versions": [
{
"lessThan": "25.1.102",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HKLM\\SOFTWARE\\PrinterLogic\\PrinterInstaller\\Overrides\\IgnoreCertificateFailures"
],
"product": "Print Application",
"vendor": "Vasion",
"versions": [
{
"lessThan": "25.1.1413",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.1.102",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.1.1413",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pierre Barre"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction\u2011point DLL injection.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003eThis vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.\u003cbr\u003e"
}
],
"value": "Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (Windows client deployments) contain a registry key that can be enabled by administrators, causing the client to skip SSL/TLS certificate validation. An attacker who can intercept HTTPS traffic can then inject malicious driver DLLs, resulting in remote code execution with SYSTEM privileges; a local attacker can achieve local privilege escalation via a junction\u2011point DLL injection.\u00a0This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced."
}
],
"impacts": [
{
"capecId": "CAPEC-217",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-217 Exploiting Incorrectly Configured SSL/TLS"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295 Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T23:56:38.182Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"tags": [
"technical-description"
],
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-lpe-04"
},
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/vasion-print-printerlogic-weak-ssl-tls-certificate-validation-rce"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Vasion Print (formerly PrinterLogic) Weak SSL/TLS Certificate Validation RCE",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2025-34235",
"datePublished": "2025-09-29T20:44:01.002Z",
"dateReserved": "2025-04-15T19:15:22.575Z",
"dateUpdated": "2025-11-17T23:56:38.182Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-34196 (GCVE-0-2025-34196)
Vulnerability from cvelistv5
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Vasion | Print Virtual Appliance Host |
Version: * ≤ |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-34196",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-29T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-30T03:55:14.128Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"PrinterInstallerClient configuration (clientsettings.dat",
"defaults.ini)"
],
"platforms": [
"Windows"
],
"product": "Print Virtual Appliance Host",
"vendor": "Vasion",
"versions": [
{
"lessThan": "25.1.102",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"PrinterInstallerClient configuration (clientsettings.dat",
"defaults.ini)"
],
"platforms": [
"Windows"
],
"product": "Print Application",
"vendor": "Vasion",
"versions": [
{
"lessThan": "25.1.1413",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.1.102",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.1.1413",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pierre Barre"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eVasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application prior to 25.1.1413 (Windows client deployments) contain a hardcoded private key for the PrinterLogic Certificate Authority (CA) and a hardcoded password in product configuration files. The Windows client ships the CA certificate and its associated private key (and other sensitive settings such as a configured password) directly in shipped configuration files (for example clientsettings.dat and defaults.ini). An attacker who obtains these files can impersonate the CA, sign arbitrary certificates trusted by the Windows client, intercept or decrypt TLS-protected communications, and otherwise perform man-in-the-middle or impersonation attacks against the product\u0027s network communications.\u0026nbsp;This vulnerability has been identified by the vendor as: V-2022-001 \u2014 Configuration File Contains CA \u0026amp; Private Key.\u003c/p\u003e"
}
],
"value": "Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application prior to 25.1.1413 (Windows client deployments) contain a hardcoded private key for the PrinterLogic Certificate Authority (CA) and a hardcoded password in product configuration files. The Windows client ships the CA certificate and its associated private key (and other sensitive settings such as a configured password) directly in shipped configuration files (for example clientsettings.dat and defaults.ini). An attacker who obtains these files can impersonate the CA, sign arbitrary certificates trusted by the Windows client, intercept or decrypt TLS-protected communications, and otherwise perform man-in-the-middle or impersonation attacks against the product\u0027s network communications.\u00a0This vulnerability has been identified by the vendor as: V-2022-001 \u2014 Configuration File Contains CA \u0026 Private Key."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798 Use of Hard-coded Credentials",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-522",
"description": "CWE-522 Insufficiently Protected Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T23:56:32.107Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"technical-description"
],
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-hardcoded-private-key"
},
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/vasion-print-printerlogic-hardcoded-printerlogic-ca-private-key-and-hardcoded-password"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Vasion Print (formerly PrinterLogic) Hardcoded PrinterLogic CA Private Key and Hardcoded Password",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2025-34196",
"datePublished": "2025-09-29T19:11:16.044Z",
"dateReserved": "2025-04-15T19:15:22.570Z",
"dateUpdated": "2025-11-17T23:56:32.107Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-34193 (GCVE-0-2025-34193)
Vulnerability from cvelistv5
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Vasion | Print Virtual Appliance Host |
Version: * ≤ |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-34193",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-19T20:09:09.506591Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-19T20:09:19.814Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"modules": [
"PrinterInstallerClientInterface.exe",
"PrinterInstallerClient.exe",
"PrinterInstallerClientLauncher.exe"
],
"platforms": [
"Windows"
],
"product": "Print Virtual Appliance Host",
"vendor": "Vasion",
"versions": [
{
"lessThan": "25.1.102",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unknown",
"modules": [
"PrinterInstallerClientInterface.exe",
"PrinterInstallerClient.exe",
"PrinterInstallerClientLauncher.exe"
],
"platforms": [
"Windows"
],
"product": "Print Application",
"vendor": "Vasion",
"versions": [
{
"lessThan": "25.1.1413",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.1.102",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.1.1413",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pierre Barre"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eVasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 include Windows client components (PrinterInstallerClientInterface.exe, PrinterInstallerClient.exe, PrinterInstallerClientLauncher.exe) that lack modern compile-time and runtime exploit mitigations and rely on outdated runtimes. These binaries are built as 32-bit, without Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), Control Flow Guard (CFG), or stack-protection, and they incorporate legacy technologies (Pascal/Delphi and Python 2) which are no longer commonly maintained. Several of these processes run with elevated privileges (NT AUTHORITY\\SYSTEM for PrinterInstallerClient.exe and PrinterInstallerClientLauncher.exe), and the client automatically downloads and installs printer drivers. The absence of modern memory safety mitigations and the use of unmaintained runtimes substantially increase the risk that memory-corruption or other exploit primitives \u2014 for example from crafted driver content or maliciously crafted inputs \u2014 can be turned into remote or local code execution and privilege escalation to SYSTEM.\u0026nbsp;This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.\u003c/p\u003e"
}
],
"value": "Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413 include Windows client components (PrinterInstallerClientInterface.exe, PrinterInstallerClient.exe, PrinterInstallerClientLauncher.exe) that lack modern compile-time and runtime exploit mitigations and rely on outdated runtimes. These binaries are built as 32-bit, without Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR), Control Flow Guard (CFG), or stack-protection, and they incorporate legacy technologies (Pascal/Delphi and Python 2) which are no longer commonly maintained. Several of these processes run with elevated privileges (NT AUTHORITY\\SYSTEM for PrinterInstallerClient.exe and PrinterInstallerClientLauncher.exe), and the client automatically downloads and installs printer drivers. The absence of modern memory safety mitigations and the use of unmaintained runtimes substantially increase the risk that memory-corruption or other exploit primitives \u2014 for example from crafted driver content or maliciously crafted inputs \u2014 can be turned into remote or local code execution and privilege escalation to SYSTEM.\u00a0This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-755",
"description": "CWE-755 Improper Handling of Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-1104",
"description": "CWE-1104 Use of Unmaintained Third Party Components",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T23:56:31.613Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"tags": [
"product"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"technical-description"
],
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-insecure-programs"
},
{
"tags": [
"product"
],
"url": "https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/vasion-print-printerlogic-insecure-windows-components-lack-modern-memory-protections-and-use-outdated-runtimes"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Vasion Print (formerly PrinterLogic) Insecure Windows Components Lack Modern Memory Protections and Use Outdated Runtimes",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2025-34193",
"datePublished": "2025-09-19T18:47:35.733Z",
"dateReserved": "2025-04-15T19:15:22.569Z",
"dateUpdated": "2025-11-17T23:56:31.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-34194 (GCVE-0-2025-34194)
Vulnerability from cvelistv5
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Vasion | Print Virtual Appliance Host |
Version: * ≤ |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-34194",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-19T20:06:15.677099Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-19T20:06:26.453Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"modules": [
"PrinterInstallerClient temporary file handling (AppData Local Temp)"
],
"platforms": [
"Windows"
],
"product": "Print Virtual Appliance Host",
"vendor": "Vasion",
"versions": [
{
"lessThan": "25.1.102",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unknown",
"modules": [
"PrinterInstallerClient temporary file handling (AppData Local Temp)"
],
"platforms": [
"Windows"
],
"product": "Print Application",
"vendor": "Vasion",
"versions": [
{
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*",
"versionEndExcluding": "25.1.102",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pierre Barre"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eVasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to\u0026nbsp;25.1.1413 (Windows client deployments) contain an insecure temporary-file handling vulnerability in the PrinterInstallerClient components. The software creates files as NT AUTHORITY\\SYSTEM inside a directory under the control of the local user (C:\\Users\\%USER%\\AppData\\Local\\Temp\\). An attacker who can place symbolic links or otherwise influence filenames in that directory can cause the service to follow the link and write to arbitrary filesystem locations as SYSTEM. This allows a local, unprivileged user to overwrite or create files as SYSTEM, leading to local privilege escalation and the ability to modify configuration files, replace or inject binaries, or otherwise compromise confidentiality, integrity, and availability of the system.\u0026nbsp;This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.\u003c/p\u003e"
}
],
"value": "Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to\u00a025.1.1413 (Windows client deployments) contain an insecure temporary-file handling vulnerability in the PrinterInstallerClient components. The software creates files as NT AUTHORITY\\SYSTEM inside a directory under the control of the local user (C:\\Users\\%USER%\\AppData\\Local\\Temp\\). An attacker who can place symbolic links or otherwise influence filenames in that directory can cause the service to follow the link and write to arbitrary filesystem locations as SYSTEM. This allows a local, unprivileged user to overwrite or create files as SYSTEM, leading to local privilege escalation and the ability to modify configuration files, replace or inject binaries, or otherwise compromise confidentiality, integrity, and availability of the system.\u00a0This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced."
}
],
"impacts": [
{
"capecId": "CAPEC-121",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-121 Exploit Non-Production Interfaces"
}
]
},
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59 Improper Link Following",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-377",
"description": "CWE-377 Insecure Temporary File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T23:56:31.790Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"technical-description"
],
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-lpe-02"
},
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/vasion-print-printerlogic-lpe-via-insecure-temporary-file-handling"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Vasion Print (formerly PrinterLogic) Local Privilege Escalation via Insecure Temporary File Handling",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2025-34194",
"datePublished": "2025-09-19T18:46:12.462Z",
"dateReserved": "2025-04-15T19:15:22.570Z",
"dateUpdated": "2025-11-17T23:56:31.790Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-34195 (GCVE-0-2025-34195)
Vulnerability from cvelistv5
- CWE-434 - Unrestricted Upload of File with Dangerous Type
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Vasion | Print Virtual Appliance Host |
Version: * ≤ |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-34195",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-19T20:01:25.364819Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-19T20:01:35.487Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"PrinterInstallerClient driver installation component"
],
"platforms": [
"Windows"
],
"product": "Print Virtual Appliance Host",
"vendor": "Vasion",
"versions": [
{
"lessThan": "1.0.735",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"PrinterInstallerClient driver installation component"
],
"platforms": [
"Windows"
],
"product": "Print Application",
"vendor": "Vasion",
"versions": [
{
"lessThan": "20.0.1330",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.735",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:*",
"versionEndExcluding": "20.0.1330",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Pierre Barre"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eVasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (Windows client deployments) contain a remote code execution vulnerability during driver installation caused by unquoted program paths. The PrinterInstallerClient driver-installation component launches programs using an unquoted path under \"C:\\Program Files (x86)\\Printer Properties Pro\\Printer Installer\". Because the path is unquoted, the operating system may execute a program located at a short-path location such as C:\\Program.exe before the intended binaries in the quoted path. If an attacker can place or cause a program to exist at that location, it will be executed with the privileges of the installer process (which may be elevated), enabling arbitrary code execution and potential privilege escalation. This weakness can be used to achieve remote code execution and full compromise of affected Windows endpoints.\u0026nbsp;This vulnerability has been identified by the vendor as: V-2022-006 \u2014 Driver Upload Security.\u003c/p\u003e"
}
],
"value": "Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (Windows client deployments) contain a remote code execution vulnerability during driver installation caused by unquoted program paths. The PrinterInstallerClient driver-installation component launches programs using an unquoted path under \"C:\\Program Files (x86)\\Printer Properties Pro\\Printer Installer\". Because the path is unquoted, the operating system may execute a program located at a short-path location such as C:\\Program.exe before the intended binaries in the quoted path. If an attacker can place or cause a program to exist at that location, it will be executed with the privileges of the installer process (which may be elevated), enabling arbitrary code execution and potential privilege escalation. This weakness can be used to achieve remote code execution and full compromise of affected Windows endpoints.\u00a0This vulnerability has been identified by the vendor as: V-2022-006 \u2014 Driver Upload Security."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T23:56:31.945Z",
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"technical-description",
"exploit"
],
"url": "https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#win-rce-01"
},
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm"
},
{
"tags": [
"third-party-advisory"
],
"url": "https://www.vulncheck.com/advisories/vasion-print-printerlogic-unquoted-path-during-driver-installation"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Vasion Print (formerly PrinterLogic) Unquoted Path During Driver Installation Leads to Execution of C:\\Program.exe",
"x_generator": {
"engine": "vulncheck"
}
}
},
"cveMetadata": {
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"cveId": "CVE-2025-34195",
"datePublished": "2025-09-19T18:38:11.712Z",
"dateReserved": "2025-04-15T19:15:22.570Z",
"dateUpdated": "2025-11-17T23:56:31.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2022-50238 (GCVE-0-2022-50238)
Vulnerability from cvelistv5
- CWE-820 - Missing Synchronization
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-50238",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-30T01:13:02.958357Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-184",
"description": "CWE-184 Incomplete List of Disallowed Inputs",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T16:01:40.773Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Windows",
"vendor": "Microsoft",
"versions": [
{
"lessThanOrEqual": "Server 2025",
"status": "affected",
"version": "10",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The on-endpoint Microsoft vulnerable driver blocklist is not fully synchronized with the online Microsoft recommended driver block rules. Some entries present on the online list have been excluded from the on-endpoint blocklist longer than the expected periodic monthly Windows updates. It is possible to fully synchronize the driver blocklist using WDAC policies. NOTE: The vendor explains that Windows Update provides a smaller, compatibility-focused driver blocklist for general users, while the full XML list is available for advanced users and organizations to customize at the risk of usability issues."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-820",
"description": "CWE-820 Missing Synchronization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-17T18:55:11.829Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/wdormann/applywdac"
},
{
"url": "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules"
}
],
"tags": [
"disputed"
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-50238",
"datePublished": "2025-09-08T00:00:00.000Z",
"dateReserved": "2025-09-08T00:00:00.000Z",
"dateUpdated": "2025-11-17T16:01:40.773Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-59033 (GCVE-0-2025-59033)
Vulnerability from cvelistv5
- CWE-420 - Unprotected Alternate Channel
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-59033",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-30T01:13:45.514218Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693 Protection Mechanism Failure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T15:57:52.240Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Windows",
"vendor": "Microsoft",
"versions": [
{
"lessThanOrEqual": "Server 2025",
"status": "affected",
"version": "10",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. Entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate\u0027s TBS hash along with a \u0027FileAttribRef\u0027 qualifier (such as file name or version) may not be blocked, whether hypervisor-protected code integrity (HVCI) is enabled or not. NOTE: The vendor disputes this CVE ID assignment and states that the driver blocklist is intended for use with HVCI."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-420",
"description": "CWE-420 Unprotected Alternate Channel",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-14T13:41:51.271Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules"
},
{
"url": "https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity"
},
{
"url": "https://x.com/JonnyJohnson_/status/1895103112924307727"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-59033",
"datePublished": "2025-09-08T00:00:00.000Z",
"dateReserved": "2025-09-08T00:00:00.000Z",
"dateUpdated": "2025-11-17T15:57:52.240Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-9491 (GCVE-0-2025-9491)
Vulnerability from cvelistv5
- CWE-451 - User Interface (UI) Misrepresentation of Critical Information
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"descriptions": [
{
"lang": "en",
"value": "In Windows 11 25H2 the .LNK file properties user interface was changed to display and copy the full contents of the \u2018Target:\u2019 field. This change was also implemented in the October 2025 updates for Windows 11 24H2 and Windows Server 2025. Previous .LNK file properties user interface behavior did not show all of the content of the \u0027Target:\u0027 field, including potentially malicious commands, if the content was prefaced with white space characters."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW"
}
},
{
"other": {
"content": {
"id": "CVE-2025-9491",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-05T20:35:49.916517Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-05T20:49:27.113Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/advisory/ADV25258226"
},
{
"tags": [
"exploit"
],
"url": "https://www.virustotal.com/gui/file/a55789d49c395a9b16cb56b0544266d9ecee409fa3c5fead8082f28c2aff4e76"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Windows",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "11 Enterprise 23H2 22631.4169 x64"
}
]
}
],
"dateAssigned": "2025-08-26T16:25:08.884Z",
"datePublic": "2025-03-18T13:51:41.444Z",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-451",
"description": "CWE-451: User Interface (UI) Misrepresentation of Critical Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T16:25:15.179Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-25-148",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-148/"
}
],
"source": {
"lang": "en",
"value": "Peter Girnus - Trend Micro Zero Day Initiative"
},
"title": "Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2025-9491",
"datePublished": "2025-08-26T16:25:15.179Z",
"dateReserved": "2025-08-26T16:25:08.823Z",
"dateUpdated": "2025-11-05T20:49:27.113Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-4056 (GCVE-0-2025-4056)
Vulnerability from cvelistv5
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Version: 0 ≤ |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-4056",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-28T13:24:15.714913Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T13:24:30.739Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://gitlab.gnome.org/GNOME/glib",
"defaultStatus": "unaffected",
"packageName": "glib",
"versions": [
{
"lessThan": "2.84.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "bootc",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "glycin-loaders",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "loupe",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "unaffected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "librsvg2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "bootc",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "glib2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "librsvg2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "unaffected",
"packageName": "mingw-glib2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
}
],
"datePublic": "2025-04-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in GLib. A denial of service on Windows platforms may occur if an application attempts to spawn a program using long command lines."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Low"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-21T07:25:00.883Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-4056"
},
{
"name": "RHBZ#2362826",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362826"
},
{
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3668"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-04-29T02:00:57.397000+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-04-29T00:00:00+00:00",
"value": "Made public."
}
],
"title": "Glib: glib crash after long command line",
"workarounds": [
{
"lang": "en",
"value": "Currently, no mitigation is available for this vulnerability."
}
],
"x_redhatCweChain": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-4056",
"datePublished": "2025-07-28T12:40:29.298Z",
"dateReserved": "2025-04-29T02:04:01.099Z",
"dateUpdated": "2025-11-21T07:25:00.883Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2024-39746 (GCVE-0-2024-39746)
Vulnerability from cvelistv5
- CWE-319 - Cleartext Transmission of Sensitive Information
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct Web Services |
Version: 6.0 Version: 6.1 Version: 6.2 Version: 6.3 cpe:2.3:a:ibm:sterling_connect\:direct:6.0.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.1.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.2.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.3.0.0:*:*:*:*:windows:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.0.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.1.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.2.0.0:*:*:*:*:unix:*:* cpe:2.3:a:ibm:sterling_connect\:direct:6.3.0.0:*:*:*:*:unix:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-39746",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-22T13:12:23.754080Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-30T13:43:29.400Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.0.0.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.1.0.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.2.0.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.3.0.0:*:*:*:*:windows:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.0.0.0:*:*:*:*:unix:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.1.0.0:*:*:*:*:unix:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.2.0.0:*:*:*:*:unix:*:*",
"cpe:2.3:a:ibm:sterling_connect\\:direct:6.3.0.0:*:*:*:*:unix:*:*"
],
"defaultStatus": "unaffected",
"product": "Sterling Connect:Direct Web Services",
"vendor": "IBM",
"versions": [
{
"status": "affected",
"version": "6.0"
},
{
"status": "affected",
"version": "6.1"
},
{
"status": "affected",
"version": "6.2"
},
{
"status": "affected",
"version": "6.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques."
}
],
"value": "IBM Sterling Connect:Direct Web Services 6.0, 6.1, 6.2, and 6.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-319",
"description": "CWE-319 Cleartext Transmission of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T15:01:03.666Z",
"orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"shortName": "ibm"
},
"references": [
{
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://www.ibm.com/support/pages/node/7166018"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "IBM Sterling Connect:Direct Web Services information disclosure",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522",
"assignerShortName": "ibm",
"cveId": "CVE-2024-39746",
"datePublished": "2024-08-22T10:29:54.169Z",
"dateReserved": "2024-06-28T09:34:46.056Z",
"dateUpdated": "2025-10-31T15:01:03.666Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-59033 (GCVE-0-2025-59033)
Vulnerability from nvd
- CWE-420 - Unprotected Alternate Channel
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-59033",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-30T01:13:45.514218Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693 Protection Mechanism Failure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T15:57:52.240Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Windows",
"vendor": "Microsoft",
"versions": [
{
"lessThanOrEqual": "Server 2025",
"status": "affected",
"version": "10",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. Entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate\u0027s TBS hash along with a \u0027FileAttribRef\u0027 qualifier (such as file name or version) may not be blocked, whether hypervisor-protected code integrity (HVCI) is enabled or not. NOTE: The vendor disputes this CVE ID assignment and states that the driver blocklist is intended for use with HVCI."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-420",
"description": "CWE-420 Unprotected Alternate Channel",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-14T13:41:51.271Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules"
},
{
"url": "https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity"
},
{
"url": "https://x.com/JonnyJohnson_/status/1895103112924307727"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-59033",
"datePublished": "2025-09-08T00:00:00.000Z",
"dateReserved": "2025-09-08T00:00:00.000Z",
"dateUpdated": "2025-11-17T15:57:52.240Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2022-50238 (GCVE-0-2022-50238)
Vulnerability from nvd
- CWE-820 - Missing Synchronization
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-50238",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-30T01:13:02.958357Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-184",
"description": "CWE-184 Incomplete List of Disallowed Inputs",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-17T16:01:40.773Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Windows",
"vendor": "Microsoft",
"versions": [
{
"lessThanOrEqual": "Server 2025",
"status": "affected",
"version": "10",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The on-endpoint Microsoft vulnerable driver blocklist is not fully synchronized with the online Microsoft recommended driver block rules. Some entries present on the online list have been excluded from the on-endpoint blocklist longer than the expected periodic monthly Windows updates. It is possible to fully synchronize the driver blocklist using WDAC policies. NOTE: The vendor explains that Windows Update provides a smaller, compatibility-focused driver blocklist for general users, while the full XML list is available for advanced users and organizations to customize at the risk of usability issues."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-820",
"description": "CWE-820 Missing Synchronization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-17T18:55:11.829Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/wdormann/applywdac"
},
{
"url": "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules"
}
],
"tags": [
"disputed"
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2022-50238",
"datePublished": "2025-09-08T00:00:00.000Z",
"dateReserved": "2025-09-08T00:00:00.000Z",
"dateUpdated": "2025-11-17T16:01:40.773Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-9491 (GCVE-0-2025-9491)
Vulnerability from nvd
- CWE-451 - User Interface (UI) Misrepresentation of Critical Information
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"descriptions": [
{
"lang": "en",
"value": "In Windows 11 25H2 the .LNK file properties user interface was changed to display and copy the full contents of the \u2018Target:\u2019 field. This change was also implemented in the October 2025 updates for Windows 11 24H2 and Windows Server 2025. Previous .LNK file properties user interface behavior did not show all of the content of the \u0027Target:\u0027 field, including potentially malicious commands, if the content was prefaced with white space characters."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
},
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW"
}
},
{
"other": {
"content": {
"id": "CVE-2025-9491",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-05T20:35:49.916517Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-05T20:49:27.113Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/advisory/ADV25258226"
},
{
"tags": [
"exploit"
],
"url": "https://www.virustotal.com/gui/file/a55789d49c395a9b16cb56b0544266d9ecee409fa3c5fead8082f28c2aff4e76"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Windows",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "11 Enterprise 23H2 22631.4169 x64"
}
]
}
],
"dateAssigned": "2025-08-26T16:25:08.884Z",
"datePublic": "2025-03-18T13:51:41.444Z",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-451",
"description": "CWE-451: User Interface (UI) Misrepresentation of Critical Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-26T16:25:15.179Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-25-148",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-148/"
}
],
"source": {
"lang": "en",
"value": "Peter Girnus - Trend Micro Zero Day Initiative"
},
"title": "Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2025-9491",
"datePublished": "2025-08-26T16:25:15.179Z",
"dateReserved": "2025-08-26T16:25:08.823Z",
"dateUpdated": "2025-11-05T20:49:27.113Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}