{"vulnerability": "CVE-2025-26670", "sightings": [{"uuid": "67e633ad-bd5e-4613-93ec-485f9dcd65f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114304071440448367", "content": "", "creation_timestamp": "2025-04-08T19:48:35.785706Z"}, {"uuid": "2c0d60b3-f63f-4418-bb82-53177c5e4a01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmdbnnr5jz2g", "content": "", "creation_timestamp": "2025-04-08T20:07:34.865965Z"}, {"uuid": "1886550b-2587-4d90-bffb-02b9b7343720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://bsky.app/profile/feedly.com/post/3lmdhuiiczc23", "content": "", "creation_timestamp": "2025-04-08T21:58:50.853971Z"}, {"uuid": "3bef390d-0e76-45e7-91ab-283edcbd7843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://bsky.app/profile/feedly.com/post/3lmdhuku3t223", "content": "", "creation_timestamp": "2025-04-08T21:58:51.446891Z"}, {"uuid": "6039ef9e-c7b5-44ce-8ae9-3be8bba04e98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "a6b97cbe-00c9-410f-af12-7ab869a70861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/77a1b8aa-f86f-4c74-af5b-7e082c7ae3de", "content": "", "creation_timestamp": "2025-04-10T11:32:21.060085Z"}, {"uuid": "11604ff3-8dff-4eb7-9a09-d9a7429df54a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://t.me/SpiderCodeCommunity1/193", "content": "Ahmed: Did you see what happened?\n\nMohamed: No, what happened?\n\nAhmed: There's an LDAP vulnerability right now that can trigger RCE on you.\n\nAhmed: Hello? Mohamed?\n\nAhmed: Did you die or what?\n\nMohamed: Help me! I just got hit with RCE!\n\n\n---\n\nHey there my friend, how are you doing? \ud83e\udd21\nI know I\u2019ve been away for a while and you\u2019re probably mad at me, but it wasn\u2019t my fault. I got sick and then exams hit me hard. But don\u2019t worry, everything went well in the end.\n\nNow, back to business\u2026\nIn April 9th, 2025, something really strange happened.\nA remote attack became possible using LDAP.\nYeah, crazy right?\n\nHold on, Spider\u2014why are you so scared? What even is this thing you\u2019re talking about?\n\nWell, my dear, if you\u2019d just give me a second\u2026\n\nWhat is LDAP?\n\nLDAP, short for Lightweight Directory Access Protocol,\nis a protocol used to store and manage information\u2014\nwhether it's for a user, a company, or even you personally.\n\nIt can store everything from the people on a network, to your personal credentials and access rights.\n\nIt\u2019s used most often in Windows Active Directory,\nespecially in large environments like corporate networks or banks.\n\nExample:\nWindows Active Directory.\n\n\n---\n\nSo, why is it dangerous?\n\nThat\u2019s what today\u2019s article is about.\nThere are two major vulnerabilities we\u2019re looking at\u2014\nboth work in the same way, and both are very dangerous.\n\nThey are Use-After-Free vulnerabilities.\n\n(Yeah, remember when I told you about that one before?)\n\nBasically, the flaw works by sending specially crafted requests to the LDAP protocol in Windows\u2014\nthese requests carry special payloads, which cause memory corruption and allow attackers to execute code remotely (RCE).\n\nSeverity: 8.1 (High)\n\nImpact: Remote Code Execution\n\nUser interaction needed? Nope.\n\n\n\n---\n\nSo what\u2019s the difference between:\n\n1. CVE-2025-26663\n\n\n2. CVE-2025-26670\n\n\n\nThey\u2019re very similar, but here\u2019s the small difference:\n\n26663: Affects the LDAP Server\u2014the attacker sends requests to the server.\n\n26670: Affects the LDAP Client\u2014the attacker tricks the client into requesting something malicious.\n\n\n\n---\n\nYou said you\u2019ve got protection? That\u2019s cool\u2026\nBut you should know these flaws affect:\n\nWindows 10, 11\n\nWindows Server 2016, 2019, 2022\n\n\n\n---\n\nSo how do you stay safe?\n\nSimple, my friend\u2014keep your system updated as much as you can.\nAnd if you don\u2019t absolutely need LDAP, I suggest you disable it for now.\nThese vulnerabilities are still fresh and very risky.", "creation_timestamp": "2025-05-03T01:47:31.000000Z"}, {"uuid": "6906cb8b-244d-4323-aa8a-31c67194a4ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://t.me/SpiderCodeCommunity1/192", "content": "\u0645\u062d\u0627\u062f\u062b\u0647 \u0628\u064a\u0646 \u0627\u062d\u0645\u062f \u0648 \u0645\u062d\u0645\u062f\n\n\n\u0627\u062d\u0645\u062f : \u0634\u0648\u0641\u062a \u0627\u0644\u064a \u062d\u0635\u0644 \u061f\n\n\u0645\u062d\u0645\u062f : \u0644\u0627 \u0645\u0634 \u0634\u0648\u0641\u062a \n\n\u0627\u062d\u0645\u062f : \u0627\u0644\u0648\u0642\u062a\u064a \u0641\u064a \u062b\u063a\u0631\u0647 \u0641\u064a \u0628\u0631\u062a\u0648\u0643\u0648\u0644 ldap \u0628\u062a\u0639\u0645\u0644 \u0639\u0644\u064a\u0643 rce\n\n\u0627\u062d\u0645\u062f : \u0627\u0644\u0648 \u0645\u062d\u0645\u062f \u061f\n\n\u0627\u062d\u0645\u062f : \u0645\u062d\u0645\u062f \u0645\u0627\u062a \u0648\u0644\u0627 \u0627\u064a \n\n\n\u0645\u062d\u0645\u062f : \u0627\u0644\u062d\u0642\u0646\u064a \u0627\u0646\u0627 \u0627\u062a\u0639\u0645\u0644 \u0639\u0644\u064a\u0627 rce \n\n\n\n\n\u0627\u0632\u064a\u0643 \u064a\u0627 \u0639\u0632\u064a\u0632\u064a \u0627\u062e\u0628\u0627\u0631\u0643 \ud83e\udd21\n\n\n\u0639\u0627\u0631\u0641 \u0627\u0646\u064a \u0627\u062a\u0627\u062e\u0631\u062a \u0639\u0644\u064a\u0643 \u0648 \u0627\u0646\u0643 \u0632\u0639\u0644\u0627\u0646 \u0645\u0646\u064a \u0628\u0633 \u0645\u0634 \u0643\u0627\u0646 \u0628\u064a\u062f\u064a \u0643\u0627\u0646 \u0628\u0633\u0628\u0628 \u0627\u0646\u064a \u0645\u0631\u0636\u062a \u0648 \u062f\u062e\u0644\u062a \u0639\u0644\u064a \u0627\u0645\u062a\u062d\u0627\u0646\u0627\u062a \u0628\u0633 \u0645\u0634 \u062a\u0642\u0644\u0642 \u0643\u0644 \u062d\u0627\u062c\u0647 \u0645\u0634\u064a\u062a \u0628\u062e\u064a\u0631\n\n\n\u0641\u064a \u0633\u0646\u0647 2025 \u062a\u062d\u062f\u064a\u062f\u0627 \u0634\u0647\u0631 \u0627\u0628\u0631\u064a\u0644 \u064a\u0648\u0645 9 \n\n\u062d\u0635\u0644 \u062d\u0627\u062c\u0647 \u063a\u0631\u064a\u0628\u0647 \u062c\u062f\u0627 \n\n\u064a\u062d\u0635\u0644 \u0639\u0645\u0644\u064a\u0647 \u0627\u062e\u062a\u0631\u0627\u0642 \u0639\u0646 \u0637\u0631\u064a\u0642 ldap \ud83d\ude31\n\n\u0644\u062d\u0638\u0647 \u0628\u0633 \u064a\u0627 \u0633\u0628\u0627\u064a\u062f\u0631 \u0627\u0646\u062a \u062e\u0627\u064a\u0641 \u0645\u0646 \u0627\u064a \u0648 \u0647\u0648 \u0627\u064a \u0627\u0644\u064a \u0628\u062a\u0642\u0648\u0644 \u0639\u0644\u064a \u062f\u0627 \u061f\n\n\u0645\u0647\u0648 \u0627\u0646\u062a \u064a\u0639\u0632\u064a\u0632\u064a \u0644\u0648 \u062a\u0633\u062a\u0646\u0627 \u0639\u0644\u064a\u0627 \u0634\u0648\u064a\u0647 \n\n\u0628\u0631\u062a\u0648\u0643\u0648\u0644 \u0627\u0644 ldap \u0627\u0648 \u0643\u0645\u0627 \u064a\u0639\u0631\u0641 \u0639\u0644\u064a\n\nLightweight Directory Access Protocol\n\n\u0647\u0648 \u0628\u0631\u062a\u0648\u0643\u0648\u0644 \u0645\u0647\u0645 \u0641\u064a \u062a\u062e\u0632\u064a\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0633\u0648\u0627\u0621 \u0643\u0627\u0646\u062a \u0644\u064a \u0639\u0645\u064a\u0644 \u0627\u0648 \u0644\u0634\u0631\u0643\u0647 \u0627\u0648 \u0644\u064a ... \u0627\u0648 \u0644\u064a\u0643 \u0627\u0646\u062a \u0634\u062e\u0635\u064a\u0627\n\n\u0648 \u0628\u064a\u0643\u0648\u0646 \u0641\u064a \u0643\u0644 \u062d\u0627\u062c\u0647 \u0645\u0646 \u0627\u0648\u0644 \u0627\u0644\u0646\u0627\u0633 \u0639\u0644\u064a \u0634\u0628\u0643\u0647 \u0644\u062d\u062f \u0645\u0639\u0644\u0648\u0645\u0627\u062a\u0643 \u0627\u0646\u062a \u0630\u0627\u062a\u0643\n\n\u0648 \u0628\u064a\u0633\u062a\u062e\u062f\u0645 \u0641\u064a Active Directory \u062a\u062d\u062f\u064a\u062f\u0627 \u0627\u0643\u062a\u0631 \u0641\u0644 \u0648\u064a\u0646\u062f\u0648\u0632 \n\n\u0648 \u0627\u062f\u0627\u0631\u0647 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0641\u064a \u0627\u0644\u0645\u062c\u062a\u0645\u0639\u0627\u062a \u0627\u0644\u0643\u0628\u064a\u0631\u0647 \u0632\u064a \u0627\u0644\u0628\u0646\u0648\u0643 \n\n\u0645\u062b\u0627\u0644 \u0639\u0644\u064a \u0647\u0648 \n\nWindows Active Directory\n\n\u0637\u064a\u0628 \u062f\u0644\u0648\u0642\u062a\u064a \u0628\u0639\u062f \u0645\u0627 \u0639\u0631\u0641\u0646\u0627 \u0627\u064a \u062e\u0637\u0648\u0631\u0647 \u0628\u062a\u0627\u0639\u062a\u0648\n\n\u0627\u0646\u0627 \u062d\u0628\u064a\u062a \u0627\u0642\u0648\u0644\u0643 \u064a\u0627 \u0639\u0632\u064a\u0632\u064a \u0627\u0646 \u0645\u0642\u0627\u0644 \u0627\u0644\u0646\u0647\u0627\u0631\u062f\u0647 \u0647\u0648 \u0639\u0646 \u062b\u063a\u0631\u062a\u064a\u0646 \u0644\u0627\u062a\u0646\u064a\u0646 \u0628\u0646\u0641\u0633 \u0627\u0644\u0637\u0631\u064a\u0642\u0647 \u0648 \u0644\u0627\u062a\u0646\u064a\u0646 \u0627\u062e\u0637\u0631 \u0645\u0646 \u0628\u0639\u0636 \u0628\u0633 \u0647\u0646\u0634\u0631\u062d\u0647\u0627 \u0641\u064a \u0627\u0644\u0645\u0642\u0627\u0644  \u062f\u0627 \u0627\u0644\u0645\u0647\u0645\n\n\u0627\u0644\u062b\u063a\u0631\u0647 \u0628\u062a\u0634\u062a\u063a\u0644 \u0639\u0646 \u0637\u0631\u064a\u0642\n\nUse - after - free\n\n\u0648 \u0627\u0644\u064a \u0643\u0646\u062a \u0627\u062a\u0643\u0644\u0645\u062a \u0639\u0646\u0647\u0627 \u0642\u0628\u0644 \u0643\u062f \u0644\u0648 \u062a\u0641\u062a\u0643\u0631\n\n\u0627\u0644\u062b\u063a\u0631\u0647 \u0628\u062a\u0634\u062a\u063a\u0644 \u0639\u0646 \u0637\u0631\u064a\u0642 \u0627\u0646\u0647\u0627 \u0628\u062a\u0639\u0645\u0644\n\n \u0637\u0644\u0628\u0627\u062a \u0644\u064a \u0628\u0631\u062a\u0648\u0643\u0648\u0644 \u062f\u0627 \u0641\u064a \u0627\u0644\u0648\u064a\u0646\u062f\u0648\u0632 \u0648 \u0627\u0644\u0637\u0644\u0628\u0627\u062a \u062f\u064a \u0628\u062a\u0643\u0648\u0646 \u0641\u064a\u0647\u0627 \u0628\u0627\u064a\u0644\u0648\u062f\u0632 \u0645\u062e\u0635\u0648\u0635\u0647 \u0644\u064a \n\n\u0648\u062f\u0631\u062c\u0647 \u062e\u0637\u0648\u0631\u062a\u0647\u0627 8.1\n\n\u0648 impact \u0628\u062a\u0627\u0639\u0647\u0627 \u0627\u0646 \u0639\u0646 \u0637\u0631\u064a\u0642\u0648 \u0645\u0645\u0643\u0646 \u064a\u062d\u0635\u0644 rce\n\n\u0627\u0648 \u0639\u0644\u064a \u0634\u0628\u0643\u0647 \n\n\u0637\u064a\u0628 \u0647\u0644 \u0644\u0632\u0645 \u062a\u062f\u062e\u0644 \u0645\u0633\u062a\u062e\u062f\u0645 \u061f\n\n\u0644\u0627\n\n\u0637\u064a\u0628 \u0647\u0644 \u0641\u064a \u0641\u0631\u0642 \u0628\u064a\u0646 \n\n1: CVE-2025-26663 \n\u0648\n\n2 : CVE-2025-26670\n\n \u0627\u064a\u0648 \u0648\u0644\u0643\u0646 \u0641\u0631\u0642 \u0628\u0633\u064a\u0637 \u062c\u062f\u0627\n\n\u0644\u0627\u0648\u0644 : \u0628\u064a\u0634\u062a\u063a\u0644 \u0639\u0646 \u0637\u0631\u064a\u0642 \u0627\u0646 \u0627\u0644\u062e\u0627\u062f\u0645 \u064a\u0633\u062a\u0642\u0628\u0644 \u0637\u0644\u0628\u0627\u062a\n\n\u0627\u0644\u062a\u0627\u0646\u064a : \u0628\u064a\u062e\u0644\u064a \u0627\u0644\u0639\u0645\u064a\u0644 \u0647\u0648 \u0627\u0644\u064a \u064a\u0637\u0644\u0628 \u0645\u0646 \u0633\u064a\u0631\u0641\u0631  \n\n\u0643\u0648\u064a\u0633 \u0627\u0646\u0643 \u0642\u0648\u0644\u062a \u0627\u0646\u0627 \u0643\u062f \u0643\u062f \u0639\u0646\u062f\u064a \u062d\u0645\u0627\u064a\u0647 \u0627\u062d\u0628 \u0627\u0642\u0648\u0644\u0643 \u064a\u0627 \u0639\u0632\u064a\u0632\u064a \u0627\u0646\u0648 \u0634\u063a\u0627\u0644 \u0639\u0644\u064a\n\nWindow 10 , 11\n\nWindow server 2016 2019 2022\n\n\u0637\u0628 \u0644\u0627\u0645\u0627\u0646 \u0645\u0646\u0647\u0627 \u0627\u0632\u0627\u064a \u061f\n\n\u0628\u0635 \u064a\u0639\u0632\u064a\u0632\u064a \u0627\u0644\u062d\u0644 \u0627\u0646\u0643 \u062a\u062d\u0627\u0648\u0644 \u062a\u062d\u062f\u062b \u0639\u0644\u064a \u0642\u062f \u0645\u0627 \u062a\u0642\u062f\u0631 \u0627\u0644\u062c\u0647\u0627\u0632 \u0628\u062a\u0627\u0639\u0643 \u0648\u0644\u0645\u0627 \u062a\u062d\u062a\u0627\u062c \u0634\u063a\u0644 \u0628\u0631\u0648\u062a\u0648\u0643\u0648\u0644 \u063a\u064a\u0631 \u0643\u062f \u0645\u0634 \u0627\u0646\u0635\u062d\u0643 \u0644\u0646\u0647 \u0644\u0633\u0647 \u062c\u062f\u064a\u062f\u0647", "creation_timestamp": "2025-05-03T01:46:36.000000Z"}, {"uuid": "b28eade0-2af6-4cce-a351-67aead8697ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26670", "type": "seen", "source": "https://t.me/kasperskyb2b/1694", "content": "\ud83d\udd2c \u0410\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u0438\u0439 Patch Tuesday: \u043b\u0443\u0447\u0448\u0435\u0435, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u0432\u043f\u0435\u0440\u0435\u0434\u0438!\n\nMicrosoft \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439, \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0432 134 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 (\u0438\u0437 \u043d\u0438\u0445 10 \u2014 \u0432 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445). \u041e\u0434\u043d\u0430 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u043c, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u043c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 ransomware, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u0440\u0430\u043d\u0435\u0435 \u043d\u0435 \u0431\u044b\u043b\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b. \u041d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u043e\u0439 \u043d\u043e\u0432\u0438\u043d\u043a\u043e\u0439 \u044d\u0442\u043e\u0433\u043e \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u0441\u0442\u0430\u043b\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f Windows 11, \u0434\u043b\u044f \u043c\u043d\u043e\u0433\u0438\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0443\u043a\u0430\u0437\u0430\u043d\u043e, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Windows 10 \u0431\u0443\u0434\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u00ab\u043f\u043e\u0437\u0436\u0435\u00bb.  \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Microsoft \u0434\u0430\u043b\u0430 \u0434\u043b\u044f \u043c\u043d\u043e\u0433\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043e\u0446\u0435\u043d\u043a\u0443 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043b\u0438\u0447\u0430\u0435\u0442\u0441\u044f \u043e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u0430 CVSS3.1. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0431\u043e\u043b\u044c\u0448\u0435 \u0447\u0435\u043c \u0432 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430\u0445 \u0441\u0434\u0435\u043b\u0430\u043d\u0430 \u043f\u043e\u043f\u0440\u0430\u0432\u043a\u0430 \u043d\u0430 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043b\u0438\u0448\u044c 11 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u043e\u0446\u0435\u043d\u043a\u0443 critical, 2 \u2014 low, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u2014 important. 49 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 31 \u2014 \u043a RCE, 17 \u2014 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 14 \u2014 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438, 9 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 3 \u2014  spoofing.\n\n\n\u0417\u0438\u0440\u043e\u0434\u0435\u0439 \u043d\u0430 \u0441\u043b\u0443\u0436\u0431\u0435 RansomEXX\nCVE-2025-29824 (7.8) \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 use after free \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 CLFS \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e system.  \n\u0414\u0435\u0444\u0435\u043a\u0442\u043e\u043c \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0441\u0430\u043c\u043e\u0439 Microsoft \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 RansomEXX/Storm-2460, \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044f \u043d\u0430 \u043f\u043e\u0440\u0430\u0436\u0451\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0431\u044d\u043a\u0434\u043e\u0440 PipeMagic \u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u044f \u0435\u0433\u043e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u0412\u043f\u0440\u043e\u0447\u0435\u043c, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0432\u0438\u0434\u0438\u0442 \u043d\u0435\u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u0446\u0435\u043b\u0435\u0432\u044b\u0435 \u0430\u0442\u0430\u043a\u0438. \u041c\u044b \u043f\u0438\u0441\u0430\u043b\u0438 \u043e\u0431 \u044d\u0442\u043e\u043c \u0412\u041f\u041e \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443, \u0430\u0442\u0430\u043a\u0438 \u0441 \u0435\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043b\u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u043e\u043b\u043d \u0432 \u0440\u0430\u0437\u043d\u044b\u0445 \u0441\u0442\u0440\u0430\u043d\u0430\u0445. \u0421\u0430\u043c\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CLFS \u0438\u043c\u0435\u043d\u043d\u043e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 \u2014 \u0445\u043e\u0440\u043e\u0448\u043e \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430\u043c\u0438 \u0444\u0435\u043d\u043e\u043c\u0435\u043d, \u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 5 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e \u043d\u0438\u0445 \u0432 Microsoft.\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\u0425\u043e\u0442\u044f \u0443 \u043c\u043d\u043e\u0433\u0438\u0445 \u043e\u043f\u0430\u0441\u043d\u043e \u0432\u044b\u0433\u043b\u044f\u0434\u044f\u0449\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0420\u0435\u0434\u043c\u043e\u043d\u0434 \u043e\u0446\u0435\u043d\u0438\u043b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u043a\u0430\u043a \u043c\u0435\u043d\u0435\u0435 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0443\u044e \u0438\u0437-\u0437\u0430 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0431\u0435\u0434\u0438\u0442\u044c \u0432 \u0433\u043e\u043d\u043a\u0435 (race condition), \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u044b \u0438\u043b\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e.\nCVE-2025-26663/CVE-2025-26670 \u2014 RCE \u0432  Windows LDAP, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443. \nCVE-2025-29809 \u2014 \u0443\u0442\u0435\u0447\u043a\u0430 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 Kerberos \u0432 \u043e\u0431\u0445\u043e\u0434 Windows Defender Credential Guard. \u041a\u0440\u043e\u043c\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u043f\u0430\u0442\u0447\u0430 \u043d\u0430\u0434\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0438 \u0437\u0430\u043d\u043e\u0432\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0438 VBS.\nCVE-2025-27480/CVE-2025-27482 \u2014 RCE \u0432 Remote Desktop Services, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0434\u043e\u043b\u0436\u0435\u043d \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u044c\u0441\u044f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0432 \u0440\u043e\u043b\u0438 \u0448\u043b\u044e\u0437\u0430 Remote Desktop.\nCVE-2025-27740 \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 Active Directory Certificate Services, \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0430\u0434\u043c\u0438\u043d\u0430. \nCVE-2025-26686 \u2014 RCE TCP/IP. \u0416\u0435\u0440\u0442\u0432\u0430 \u0434\u043e\u043b\u0436\u043d\u0430 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0437\u0430\u043f\u0440\u043e\u0441 \u043d\u0430 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 DHCPv6, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u0432 \u043e\u0442\u0432\u0435\u0442. \nCVE-2025-27752 / CVE-2025-29791 \u2014 RCE \u0432 Excel, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0435 \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430. \u0411\u043e\u043d\u0443\u0441\u043e\u043c \u2014 CVE-2025-27745, -27748, -27749, \u0432\u0441\u0435 \u0432 Office \u0431\u0435\u0437 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u044f \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432, \u0442\u043e\u0436\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0435 \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440.\n\n#\u043f\u0430\u0442\u0447\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #Microsoft @\u041f2\u0422", "creation_timestamp": "2025-04-09T09:10:24.000000Z"}]}