Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-59287 (GCVE-0-2025-59287)
Vulnerability from cvelistv5 – Published: 2025-10-14 17:01 – Updated: 2026-02-26 16:58- CWE-502 - Deserialization of Untrusted Data
| URL | Tags |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerabi… | vendor-advisorypatch |
| Vendor | Product | Version | |
|---|---|---|---|
| Microsoft | Windows Server 2012 |
Affected:
6.2.9200.0 , < 6.2.9200.25728
(custom)
|
|
| Microsoft | Windows Server 2012 (Server Core installation) |
Affected:
6.2.9200.0 , < 6.2.9200.25728
(custom)
|
|
| Microsoft | Windows Server 2012 R2 |
Affected:
6.3.9600.0 , < 6.3.9600.22826
(custom)
|
|
| Microsoft | Windows Server 2012 R2 (Server Core installation) |
Affected:
6.3.9600.0 , < 6.3.9600.22826
(custom)
|
|
| Microsoft | Windows Server 2016 |
Affected:
10.0.14393.0 , < 10.0.14393.8524
(custom)
|
|
| Microsoft | Windows Server 2016 (Server Core installation) |
Affected:
10.0.14393.0 , < 10.0.14393.8524
(custom)
|
|
| Microsoft | Windows Server 2019 |
Affected:
10.0.17763.0 , < 10.0.17763.7922
(custom)
|
|
| Microsoft | Windows Server 2019 (Server Core installation) |
Affected:
10.0.17763.0 , < 10.0.17763.7922
(custom)
|
|
| Microsoft | Windows Server 2022 |
Affected:
10.0.20348.0 , < 10.0.20348.4297
(custom)
|
|
| Microsoft | Windows Server 2022, 23H2 Edition (Server Core installation) |
Affected:
10.0.25398.0 , < 10.0.25398.1916
(custom)
|
|
| Microsoft | Windows Server 2025 |
Affected:
10.0.26100.0 , < 10.0.26100.6905
(custom)
|
|
| Microsoft | Windows Server 2025 (Server Core installation) |
Affected:
10.0.26100.0 , < 10.0.26100.6905
(custom)
|
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-502 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Windows |
| Due Date | 2025-11-14 |
| Date Added | 2025-10-24 |
| Vendorproject | Microsoft |
| Vulnerabilityname | Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-59287",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-25T03:56:03.912708Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-10-24",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T16:58:01.519Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951"
},
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-10-24T00:00:00.000Z",
"value": "CVE-2025-59287 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-11T15:00:23.270Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-server-wsus-flaw-exploited-in-attacks/"
},
{
"url": "https://hawktrace.com/blog/CVE-2025-59287"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-59287-detection-script-rce-vulnerability-in-windows-server-update-service"
},
{
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-59287-mitigation-script-rce-vulnerability-in-windows-server-update-service"
}
],
"title": "CVE Program Container",
"x_generator": {
"engine": "ADPogram 0.0.1"
}
}
],
"cna": {
"affected": [
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.2.9200.25728",
"status": "affected",
"version": "6.2.9200.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.2.9200.25728",
"status": "affected",
"version": "6.2.9200.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 R2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.3.9600.22826",
"status": "affected",
"version": "6.3.9600.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 R2 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.3.9600.22826",
"status": "affected",
"version": "6.3.9600.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2016",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.8524",
"status": "affected",
"version": "10.0.14393.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2016 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.8524",
"status": "affected",
"version": "10.0.14393.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2019",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.7922",
"status": "affected",
"version": "10.0.17763.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2019 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.7922",
"status": "affected",
"version": "10.0.17763.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2022",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.20348.4297",
"status": "affected",
"version": "10.0.20348.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2022, 23H2 Edition (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.25398.1916",
"status": "affected",
"version": "10.0.25398.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2025",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.26100.6905",
"status": "affected",
"version": "10.0.26100.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2025 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.26100.6905",
"status": "affected",
"version": "10.0.26100.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.7922",
"versionStartIncluding": "10.0.17763.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.7922",
"versionStartIncluding": "10.0.17763.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.4297",
"versionStartIncluding": "10.0.20348.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.6905",
"versionStartIncluding": "10.0.26100.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1916",
"versionStartIncluding": "10.0.25398.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.26100.6905",
"versionStartIncluding": "10.0.26100.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.8524",
"versionStartIncluding": "10.0.14393.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.8524",
"versionStartIncluding": "10.0.14393.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.2.9200.25728",
"versionStartIncluding": "6.2.9200.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.2.9200.25728",
"versionStartIncluding": "6.2.9200.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.3.9600.22826",
"versionStartIncluding": "6.3.9600.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.3.9600.22826",
"versionStartIncluding": "6.3.9600.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2025-10-14T14:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502: Deserialization of Untrusted Data",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-22T17:26:07.844Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Windows Server Update Service (WSUS) Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
}
],
"title": "Windows Server Update Service (WSUS) Remote Code Execution Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2025-59287",
"datePublished": "2025-10-14T17:01:47.629Z",
"dateReserved": "2025-09-11T19:36:03.690Z",
"dateUpdated": "2026-02-26T16:58:01.519Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2025-59287",
"cwes": "[\"CWE-502\"]",
"dateAdded": "2025-10-24",
"dueDate": "2025-11-14",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59287",
"product": "Windows",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Microsoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution.",
"vendorProject": "Microsoft",
"vulnerabilityName": "Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability"
},
"epss": {
"cve": "CVE-2025-59287",
"date": "2026-05-19",
"epss": "0.69069",
"percentile": "0.98656"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-59287\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-10-14T17:16:11.670\",\"lastModified\":\"2025-11-12T14:33:19.727\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"cisaExploitAdd\":\"2025-10-24\",\"cisaActionDue\":\"2025-11-14\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability\",\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.14393.8524\",\"matchCriteriaId\":\"7200EF9B-2689-4E9E-BE9E-E00836A7D284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.17763.7922\",\"matchCriteriaId\":\"D9DDF9BE-8D0B-4027-B3F7-FFD96438E3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.20348.4297\",\"matchCriteriaId\":\"BDAC36D7-54A0-456B-B176-17A0B9E63C7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.25398.1916\",\"matchCriteriaId\":\"FBA85BFD-9802-452E-97B1-6380554EF254\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.26100.6905\",\"matchCriteriaId\":\"2E5FFF5B-8745-47F6-A0B7-262AA43353BB\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://hawktrace.com/blog/CVE-2025-59287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-server-wsus-flaw-exploited-in-attacks/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Press/Media Coverage\"]},{\"url\":\"https://www.vicarius.io/vsociety/posts/cve-2025-59287-detection-script-rce-vulnerability-in-windows-server-update-service\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vicarius.io/vsociety/posts/cve-2025-59287-mitigation-script-rce-vulnerability-in-windows-server-update-service\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-server-wsus-flaw-exploited-in-attacks/\"}, {\"url\": \"https://hawktrace.com/blog/CVE-2025-59287\"}, {\"url\": \"https://www.vicarius.io/vsociety/posts/cve-2025-59287-detection-script-rce-vulnerability-in-windows-server-update-service\"}, {\"url\": \"https://www.vicarius.io/vsociety/posts/cve-2025-59287-mitigation-script-rce-vulnerability-in-windows-server-update-service\"}], \"x_generator\": {\"engine\": \"ADPogram 0.0.1\"}, \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-11T15:00:23.270Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-59287\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-25T03:56:03.912708Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2025-10-24\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-10-24T00:00:00.000Z\", \"value\": \"CVE-2025-59287 added to CISA KEV\"}], \"references\": [{\"url\": \"https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951\", \"tags\": [\"exploit\"]}, {\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287\", \"tags\": [\"government-resource\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-20T12:44:47.859Z\"}}], \"cna\": {\"title\": \"Windows Server Update Service (WSUS) Remote Code Execution Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.9200.0\", \"lessThan\": \"6.2.9200.25728\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.9200.0\", \"lessThan\": \"6.2.9200.25728\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 R2\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.9600.0\", \"lessThan\": \"6.3.9600.22826\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 R2 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.9600.0\", \"lessThan\": \"6.3.9600.22826\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2016\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.14393.0\", \"lessThan\": \"10.0.14393.8524\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2016 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.14393.0\", \"lessThan\": \"10.0.14393.8524\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2019\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.17763.0\", \"lessThan\": \"10.0.17763.7922\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2019 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.17763.0\", \"lessThan\": \"10.0.17763.7922\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2022\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.20348.0\", \"lessThan\": \"10.0.20348.4297\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2022, 23H2 Edition (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.25398.0\", \"lessThan\": \"10.0.25398.1916\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2025\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.26100.0\", \"lessThan\": \"10.0.26100.6905\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Windows Server 2025 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.26100.0\", \"lessThan\": \"10.0.26100.6905\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}], \"datePublic\": \"2025-10-14T14:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287\", \"name\": \"Windows Server Update Service (WSUS) Remote Code Execution Vulnerability\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-502\", \"description\": \"CWE-502: Deserialization of Untrusted Data\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.17763.7922\", \"versionStartIncluding\": \"10.0.17763.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.17763.7922\", \"versionStartIncluding\": \"10.0.17763.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.20348.4297\", \"versionStartIncluding\": \"10.0.20348.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.26100.6905\", \"versionStartIncluding\": \"10.0.26100.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.25398.1916\", \"versionStartIncluding\": \"10.0.25398.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.26100.6905\", \"versionStartIncluding\": \"10.0.26100.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.14393.8524\", \"versionStartIncluding\": \"10.0.14393.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.14393.8524\", \"versionStartIncluding\": \"10.0.14393.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2.9200.25728\", \"versionStartIncluding\": \"6.2.9200.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2.9200.25728\", \"versionStartIncluding\": \"6.2.9200.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3.9600.22826\", \"versionStartIncluding\": \"6.3.9600.0\"}, {\"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3.9600.22826\", \"versionStartIncluding\": \"6.3.9600.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2026-02-22T17:26:07.844Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-59287\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-26T16:58:01.519Z\", \"dateReserved\": \"2025-09-11T19:36:03.690Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-10-14T17:01:47.629Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0879
Vulnerability from certfr_avis - Published: 2025-10-15 - Updated: 2025-10-15
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que les vulnérabilités CVE-2025-24990, CVE-2025-47827 et CVE-2025-59230 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21161 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25722 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22824 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4294 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4294 | ||
| Microsoft | Windows | Windows App Client pour Windows Desktop versions antérieures à 2.0.706.0 | ||
| Microsoft | Windows | Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6599.0 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27974 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1913 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows 11 Version 25H2 pour systèmes ARM64 versions antérieures à 10.0.26200.6899 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.6060 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.6060 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22824 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6060 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27974 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25722 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21161 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25722",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22824",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4294",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4294",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.706.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6599.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27974",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1913",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26200.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22824",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27974",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25722",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-55691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55691"
},
{
"name": "CVE-2025-58738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58738"
},
{
"name": "CVE-2025-58729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58729"
},
{
"name": "CVE-2025-55684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55684"
},
{
"name": "CVE-2025-59197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59197"
},
{
"name": "CVE-2025-55679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55679"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2025-58719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58719"
},
{
"name": "CVE-2025-59190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59190"
},
{
"name": "CVE-2025-58736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58736"
},
{
"name": "CVE-2025-59254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59254"
},
{
"name": "CVE-2025-59206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59206"
},
{
"name": "CVE-2025-59295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59295"
},
{
"name": "CVE-2025-59287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59287"
},
{
"name": "CVE-2025-55678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55678"
},
{
"name": "CVE-2025-59208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59208"
},
{
"name": "CVE-2025-58731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58731"
},
{
"name": "CVE-2025-55339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55339"
},
{
"name": "CVE-2025-59191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59191"
},
{
"name": "CVE-2025-55676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55676"
},
{
"name": "CVE-2025-58730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58730"
},
{
"name": "CVE-2025-59187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59187"
},
{
"name": "CVE-2025-55685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55685"
},
{
"name": "CVE-2025-59257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59257"
},
{
"name": "CVE-2025-58735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58735"
},
{
"name": "CVE-2025-58717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58717"
},
{
"name": "CVE-2025-59199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59199"
},
{
"name": "CVE-2025-59278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59278"
},
{
"name": "CVE-2025-59198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59198"
},
{
"name": "CVE-2025-58725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58725"
},
{
"name": "CVE-2025-55332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55332"
},
{
"name": "CVE-2025-59230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59230"
},
{
"name": "CVE-2025-55690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55690"
},
{
"name": "CVE-2025-58732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58732"
},
{
"name": "CVE-2025-59194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59194"
},
{
"name": "CVE-2025-59258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59258"
},
{
"name": "CVE-2025-55687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55687"
},
{
"name": "CVE-2025-55335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55335"
},
{
"name": "CVE-2025-53139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53139"
},
{
"name": "CVE-2025-59192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59192"
},
{
"name": "CVE-2025-59255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59255"
},
{
"name": "CVE-2025-58726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58726"
},
{
"name": "CVE-2025-47979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47979"
},
{
"name": "CVE-2025-59186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59186"
},
{
"name": "CVE-2025-58716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58716"
},
{
"name": "CVE-2025-58733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58733"
},
{
"name": "CVE-2025-59201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59201"
},
{
"name": "CVE-2025-58720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58720"
},
{
"name": "CVE-2025-59207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59207"
},
{
"name": "CVE-2025-55333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55333"
},
{
"name": "CVE-2025-59200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59200"
},
{
"name": "CVE-2025-59282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59282"
},
{
"name": "CVE-2025-55682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55682"
},
{
"name": "CVE-2025-55694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55694"
},
{
"name": "CVE-2025-58737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58737"
},
{
"name": "CVE-2025-55331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55331"
},
{
"name": "CVE-2025-59261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59261"
},
{
"name": "CVE-2025-55325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55325"
},
{
"name": "CVE-2025-59259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59259"
},
{
"name": "CVE-2025-55334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55334"
},
{
"name": "CVE-2025-59205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59205"
},
{
"name": "CVE-2025-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48813"
},
{
"name": "CVE-2025-48004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48004"
},
{
"name": "CVE-2025-59260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59260"
},
{
"name": "CVE-2025-55688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55688"
},
{
"name": "CVE-2025-55701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55701"
},
{
"name": "CVE-2025-59189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59189"
},
{
"name": "CVE-2025-55330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55330"
},
{
"name": "CVE-2025-55698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55698"
},
{
"name": "CVE-2025-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49708"
},
{
"name": "CVE-2025-59195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59195"
},
{
"name": "CVE-2025-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50152"
},
{
"name": "CVE-2025-59294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59294"
},
{
"name": "CVE-2025-59214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59214"
},
{
"name": "CVE-2025-55693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55693"
},
{
"name": "CVE-2025-59204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59204"
},
{
"name": "CVE-2025-55336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55336"
},
{
"name": "CVE-2025-24052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24052"
},
{
"name": "CVE-2025-55338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55338"
},
{
"name": "CVE-2025-55692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55692"
},
{
"name": "CVE-2025-55326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55326"
},
{
"name": "CVE-2025-59244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59244"
},
{
"name": "CVE-2025-55696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55696"
},
{
"name": "CVE-2025-59184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59184"
},
{
"name": "CVE-2025-59209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59209"
},
{
"name": "CVE-2025-55686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55686"
},
{
"name": "CVE-2025-47827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47827"
},
{
"name": "CVE-2025-59277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59277"
},
{
"name": "CVE-2025-59253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59253"
},
{
"name": "CVE-2025-50174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50174"
},
{
"name": "CVE-2025-59241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59241"
},
{
"name": "CVE-2025-58728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58728"
},
{
"name": "CVE-2025-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53150"
},
{
"name": "CVE-2025-59242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59242"
},
{
"name": "CVE-2025-55677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55677"
},
{
"name": "CVE-2025-59185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59185"
},
{
"name": "CVE-2025-55681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55681"
},
{
"name": "CVE-2025-58718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58718"
},
{
"name": "CVE-2025-55700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55700"
},
{
"name": "CVE-2025-59502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59502"
},
{
"name": "CVE-2025-59275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59275"
},
{
"name": "CVE-2025-59284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59284"
},
{
"name": "CVE-2025-55340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55340"
},
{
"name": "CVE-2025-58734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58734"
},
{
"name": "CVE-2025-55697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55697"
},
{
"name": "CVE-2025-59203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59203"
},
{
"name": "CVE-2025-58715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58715"
},
{
"name": "CVE-2025-55695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55695"
},
{
"name": "CVE-2025-59289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59289"
},
{
"name": "CVE-2025-58714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58714"
},
{
"name": "CVE-2025-25004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25004"
},
{
"name": "CVE-2025-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53768"
},
{
"name": "CVE-2025-55699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55699"
},
{
"name": "CVE-2025-50175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50175"
},
{
"name": "CVE-2025-59211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59211"
},
{
"name": "CVE-2025-58739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58739"
},
{
"name": "CVE-2025-59202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59202"
},
{
"name": "CVE-2025-59193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59193"
},
{
"name": "CVE-2025-55683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55683"
},
{
"name": "CVE-2025-59280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59280"
},
{
"name": "CVE-2025-24990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24990"
},
{
"name": "CVE-2025-59210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59210"
},
{
"name": "CVE-2025-58722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58722"
},
{
"name": "CVE-2025-59188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59188"
},
{
"name": "CVE-2025-55689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55689"
},
{
"name": "CVE-2025-58727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58727"
},
{
"name": "CVE-2025-55328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55328"
},
{
"name": "CVE-2025-59290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59290"
},
{
"name": "CVE-2025-55680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55680"
},
{
"name": "CVE-2025-2884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2884"
},
{
"name": "CVE-2025-53717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53717"
},
{
"name": "CVE-2025-59196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59196"
},
{
"name": "CVE-2025-55337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55337"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2025-54957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54957"
}
],
"initial_release_date": "2025-10-15T00:00:00",
"last_revision_date": "2025-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0879",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2025-24990, CVE-2025-47827 et CVE-2025-59230 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59205",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55682",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59204",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59275",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50175",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55697",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58737",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55326",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53139",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59502",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55328",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59261",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59214",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58718",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58738",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55687",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59255",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48004",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55688",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55700",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59259",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59196",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55336",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55696",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55685",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55694",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47827",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59254",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55340",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58722",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55690",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55692",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59184",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59192",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55683",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54957",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58714",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55689",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55693",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59194",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59197",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58736",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58716",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55333",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59190",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59198",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53150",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59202",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58730",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58733",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59200",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55701",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58734",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55698",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-25004",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59209",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59290",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59191",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55332",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55678",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59278",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59242",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55331",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58715",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47979",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59188",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59201",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55677",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58719",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58739",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24052",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58735",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55691",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55676",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55337",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59241",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55335",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59206",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59295",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55681",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55330",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59280",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59258",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59282",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59186",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55699",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24990",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59203",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59260",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55248",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58726",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55684",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48813",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59193",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59189",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55339",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58728",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59207",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55338",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59210",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2016-9535",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58725",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-2884",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53768",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59257",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55686",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59185",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55680",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59294",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49708",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59187",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50174",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58732",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55679",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59195",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50152",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59199",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55695",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55325",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59208",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208"
}
]
}
CERTFR-2025-AVI-0930
Vulnerability from certfr_avis - Published: 2025-10-27 - Updated: 2025-10-27
Une vulnérabilité a été découverte dans Microsoft Windows Server Update Service. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
L'éditeur a publié un nouveau correctif de sécurité pour cette vulnérabilité qui remplace le correctif précédemment listé dans l'avis CERTFR-2025-AVI-0879.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
La vulnérabilité concerne la fonctionnalité Windows Server Update Service (WSUS) activée sur Windows Server.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1916 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4297 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.6905 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8524 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7922 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22826 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25728 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8524 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22826 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4297 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6905 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7922 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25728 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1916",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4297",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6905",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7922",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22826",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25728",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22826",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4297",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6905",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7922",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25728",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "La vuln\u00e9rabilit\u00e9 concerne la fonctionnalit\u00e9 Windows Server Update Service (WSUS) activ\u00e9e sur Windows Server.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-59287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59287"
}
],
"initial_release_date": "2025-10-27T00:00:00",
"last_revision_date": "2025-10-27T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0930",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows Server Update Service. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n\nL\u0027\u00e9diteur a publi\u00e9 un nouveau correctif de s\u00e9curit\u00e9 pour cette vuln\u00e9rabilit\u00e9 qui remplace le correctif pr\u00e9c\u00e9demment list\u00e9 dans l\u0027avis CERTFR-2025-AVI-0879. ",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows Server Update Service",
"vendor_advisories": [
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
}
]
}
CERTFR-2025-AVI-0879
Vulnerability from certfr_avis - Published: 2025-10-15 - Updated: 2025-10-15
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que les vulnérabilités CVE-2025-24990, CVE-2025-47827 et CVE-2025-59230 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21161 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25722 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22824 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4294 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4294 | ||
| Microsoft | Windows | Windows App Client pour Windows Desktop versions antérieures à 2.0.706.0 | ||
| Microsoft | Windows | Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6599.0 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27974 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1913 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6456 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows 11 Version 25H2 pour systèmes ARM64 versions antérieures à 10.0.26200.6899 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6456 | ||
| Microsoft | Windows | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.6060 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23571 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.6060 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22824 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6060 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6899 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27974 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8519 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25722 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7919 | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21161 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25722",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22824",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4294",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4294",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.706.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6599.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27974",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1913",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26200.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6456",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23571",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22824",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27974",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8519",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25722",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7919",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21161",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-55691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55691"
},
{
"name": "CVE-2025-58738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58738"
},
{
"name": "CVE-2025-58729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58729"
},
{
"name": "CVE-2025-55684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55684"
},
{
"name": "CVE-2025-59197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59197"
},
{
"name": "CVE-2025-55679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55679"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2025-58719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58719"
},
{
"name": "CVE-2025-59190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59190"
},
{
"name": "CVE-2025-58736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58736"
},
{
"name": "CVE-2025-59254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59254"
},
{
"name": "CVE-2025-59206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59206"
},
{
"name": "CVE-2025-59295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59295"
},
{
"name": "CVE-2025-59287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59287"
},
{
"name": "CVE-2025-55678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55678"
},
{
"name": "CVE-2025-59208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59208"
},
{
"name": "CVE-2025-58731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58731"
},
{
"name": "CVE-2025-55339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55339"
},
{
"name": "CVE-2025-59191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59191"
},
{
"name": "CVE-2025-55676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55676"
},
{
"name": "CVE-2025-58730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58730"
},
{
"name": "CVE-2025-59187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59187"
},
{
"name": "CVE-2025-55685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55685"
},
{
"name": "CVE-2025-59257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59257"
},
{
"name": "CVE-2025-58735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58735"
},
{
"name": "CVE-2025-58717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58717"
},
{
"name": "CVE-2025-59199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59199"
},
{
"name": "CVE-2025-59278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59278"
},
{
"name": "CVE-2025-59198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59198"
},
{
"name": "CVE-2025-58725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58725"
},
{
"name": "CVE-2025-55332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55332"
},
{
"name": "CVE-2025-59230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59230"
},
{
"name": "CVE-2025-55690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55690"
},
{
"name": "CVE-2025-58732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58732"
},
{
"name": "CVE-2025-59194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59194"
},
{
"name": "CVE-2025-59258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59258"
},
{
"name": "CVE-2025-55687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55687"
},
{
"name": "CVE-2025-55335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55335"
},
{
"name": "CVE-2025-53139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53139"
},
{
"name": "CVE-2025-59192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59192"
},
{
"name": "CVE-2025-59255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59255"
},
{
"name": "CVE-2025-58726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58726"
},
{
"name": "CVE-2025-47979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47979"
},
{
"name": "CVE-2025-59186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59186"
},
{
"name": "CVE-2025-58716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58716"
},
{
"name": "CVE-2025-58733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58733"
},
{
"name": "CVE-2025-59201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59201"
},
{
"name": "CVE-2025-58720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58720"
},
{
"name": "CVE-2025-59207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59207"
},
{
"name": "CVE-2025-55333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55333"
},
{
"name": "CVE-2025-59200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59200"
},
{
"name": "CVE-2025-59282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59282"
},
{
"name": "CVE-2025-55682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55682"
},
{
"name": "CVE-2025-55694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55694"
},
{
"name": "CVE-2025-58737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58737"
},
{
"name": "CVE-2025-55331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55331"
},
{
"name": "CVE-2025-59261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59261"
},
{
"name": "CVE-2025-55325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55325"
},
{
"name": "CVE-2025-59259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59259"
},
{
"name": "CVE-2025-55334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55334"
},
{
"name": "CVE-2025-59205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59205"
},
{
"name": "CVE-2025-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48813"
},
{
"name": "CVE-2025-48004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48004"
},
{
"name": "CVE-2025-59260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59260"
},
{
"name": "CVE-2025-55688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55688"
},
{
"name": "CVE-2025-55701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55701"
},
{
"name": "CVE-2025-59189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59189"
},
{
"name": "CVE-2025-55330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55330"
},
{
"name": "CVE-2025-55698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55698"
},
{
"name": "CVE-2025-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49708"
},
{
"name": "CVE-2025-59195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59195"
},
{
"name": "CVE-2025-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50152"
},
{
"name": "CVE-2025-59294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59294"
},
{
"name": "CVE-2025-59214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59214"
},
{
"name": "CVE-2025-55693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55693"
},
{
"name": "CVE-2025-59204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59204"
},
{
"name": "CVE-2025-55336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55336"
},
{
"name": "CVE-2025-24052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24052"
},
{
"name": "CVE-2025-55338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55338"
},
{
"name": "CVE-2025-55692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55692"
},
{
"name": "CVE-2025-55326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55326"
},
{
"name": "CVE-2025-59244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59244"
},
{
"name": "CVE-2025-55696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55696"
},
{
"name": "CVE-2025-59184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59184"
},
{
"name": "CVE-2025-59209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59209"
},
{
"name": "CVE-2025-55686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55686"
},
{
"name": "CVE-2025-47827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47827"
},
{
"name": "CVE-2025-59277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59277"
},
{
"name": "CVE-2025-59253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59253"
},
{
"name": "CVE-2025-50174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50174"
},
{
"name": "CVE-2025-59241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59241"
},
{
"name": "CVE-2025-58728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58728"
},
{
"name": "CVE-2025-53150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53150"
},
{
"name": "CVE-2025-59242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59242"
},
{
"name": "CVE-2025-55677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55677"
},
{
"name": "CVE-2025-59185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59185"
},
{
"name": "CVE-2025-55681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55681"
},
{
"name": "CVE-2025-58718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58718"
},
{
"name": "CVE-2025-55700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55700"
},
{
"name": "CVE-2025-59502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59502"
},
{
"name": "CVE-2025-59275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59275"
},
{
"name": "CVE-2025-59284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59284"
},
{
"name": "CVE-2025-55340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55340"
},
{
"name": "CVE-2025-58734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58734"
},
{
"name": "CVE-2025-55697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55697"
},
{
"name": "CVE-2025-59203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59203"
},
{
"name": "CVE-2025-58715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58715"
},
{
"name": "CVE-2025-55695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55695"
},
{
"name": "CVE-2025-59289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59289"
},
{
"name": "CVE-2025-58714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58714"
},
{
"name": "CVE-2025-25004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25004"
},
{
"name": "CVE-2025-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53768"
},
{
"name": "CVE-2025-55699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55699"
},
{
"name": "CVE-2025-50175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50175"
},
{
"name": "CVE-2025-59211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59211"
},
{
"name": "CVE-2025-58739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58739"
},
{
"name": "CVE-2025-59202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59202"
},
{
"name": "CVE-2025-59193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59193"
},
{
"name": "CVE-2025-55683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55683"
},
{
"name": "CVE-2025-59280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59280"
},
{
"name": "CVE-2025-24990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24990"
},
{
"name": "CVE-2025-59210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59210"
},
{
"name": "CVE-2025-58722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58722"
},
{
"name": "CVE-2025-59188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59188"
},
{
"name": "CVE-2025-55689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55689"
},
{
"name": "CVE-2025-58727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58727"
},
{
"name": "CVE-2025-55328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55328"
},
{
"name": "CVE-2025-59290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59290"
},
{
"name": "CVE-2025-55680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55680"
},
{
"name": "CVE-2025-2884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2884"
},
{
"name": "CVE-2025-53717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53717"
},
{
"name": "CVE-2025-59196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59196"
},
{
"name": "CVE-2025-55337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55337"
},
{
"name": "CVE-2016-9535",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
},
{
"name": "CVE-2025-54957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54957"
}
],
"initial_release_date": "2025-10-15T00:00:00",
"last_revision_date": "2025-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0879",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2025-24990, CVE-2025-47827 et CVE-2025-59230 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59205",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55682",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59204",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59275",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50175",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55697",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58737",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55326",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53139",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59502",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55328",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59261",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59214",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58718",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58738",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55687",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59255",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48004",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55688",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55700",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59259",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59196",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55336",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55696",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55685",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55694",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47827",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59254",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55340",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58722",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55690",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55692",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59184",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59192",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55683",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54957",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58714",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55689",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55693",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59194",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59197",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58736",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58716",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55333",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59190",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59198",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53150",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59202",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58730",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58733",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59200",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55701",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58734",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55698",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-25004",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59209",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59290",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59191",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55332",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55678",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59278",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59242",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55331",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58715",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47979",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59188",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59201",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55677",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58719",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58739",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24052",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58735",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55691",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55676",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55337",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59241",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55335",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59206",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59295",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55681",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55330",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59280",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59258",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59282",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59186",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55699",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24990",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59203",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59260",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55248",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58726",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55684",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48813",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59193",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59189",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55339",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58728",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59207",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55338",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59210",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2016-9535",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58725",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-2884",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53768",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59257",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55686",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59185",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55680",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59294",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49708",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59187",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50174",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58732",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55679",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59195",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50152",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59199",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55695",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55325",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59208",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208"
}
]
}
CERTFR-2025-AVI-0930
Vulnerability from certfr_avis - Published: 2025-10-27 - Updated: 2025-10-27
Une vulnérabilité a été découverte dans Microsoft Windows Server Update Service. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
L'éditeur a publié un nouveau correctif de sécurité pour cette vulnérabilité qui remplace le correctif précédemment listé dans l'avis CERTFR-2025-AVI-0879.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
La vulnérabilité concerne la fonctionnalité Windows Server Update Service (WSUS) activée sur Windows Server.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1916 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4297 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.6905 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8524 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7922 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22826 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25728 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8524 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22826 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4297 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6905 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.7922 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25728 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1916",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4297",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6905",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7922",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22826",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25728",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8524",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22826",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4297",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6905",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7922",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25728",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "La vuln\u00e9rabilit\u00e9 concerne la fonctionnalit\u00e9 Windows Server Update Service (WSUS) activ\u00e9e sur Windows Server.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-59287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59287"
}
],
"initial_release_date": "2025-10-27T00:00:00",
"last_revision_date": "2025-10-27T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0930",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows Server Update Service. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n\nL\u0027\u00e9diteur a publi\u00e9 un nouveau correctif de s\u00e9curit\u00e9 pour cette vuln\u00e9rabilit\u00e9 qui remplace le correctif pr\u00e9c\u00e9demment list\u00e9 dans l\u0027avis CERTFR-2025-AVI-0879. ",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows Server Update Service",
"vendor_advisories": [
{
"published_at": "2025-10-24",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59287",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
}
]
}
BDU:2025-12999
Vulnerability from fstec - Published: 14.10.2025{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO2317, TO2318, TO2319, TO2345, TO2346, TO2363",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO2317 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066586), TO2318 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2016 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066836), TO2319 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066586), TO2345 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5070883), TO2346 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2022 21H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5070884), TO2363 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5070883)",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 6.3.9600.22824 (Windows Server 2012 R2 (Server Core installation)), \u0434\u043e 6.3.9600.22824 (Windows Server 2012 R2), \u0434\u043e 6.2.9200.25722 (Windows Server 2012 (Server Core installation)), \u0434\u043e 6.2.9200.25722 (Windows Server 2012), \u0434\u043e 10.0.14393.8519 (Windows Server 2016 (Server Core installation)), \u0434\u043e 10.0.14393.8519 (Windows Server 2016), \u0434\u043e 10.0.26100.6899 (Windows Server 2025), \u0434\u043e 10.0.25398.1913 (Windows Server 2022, 23H2 Edition (Server Core installation)), \u0434\u043e 10.0.26100.6899 (Windows Server 2025 (Server Core installation)), \u0434\u043e 10.0.20348.4294 (Windows Server 2022 (Server Core installation)), \u0434\u043e 10.0.20348.4294 (Windows Server 2022), \u0434\u043e 10.0.17763.7919 (Windows Server 2019 (Server Core installation)), \u0434\u043e 10.0.17763.7919 (Windows Server 2019)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.10.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "16.10.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-12999",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-59287",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 (Server Core installation), Windows Server 2012, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows Server 2025, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2025 (Server Core installation), Windows Server 2022 (Server Core installation), Windows Server 2022, Windows Server 2019 (Server Core installation), Windows Server 2019",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows Server 2012 R2 (Server Core installation) \u0434\u043e 6.3.9600.22824 , Microsoft Corp Windows Server 2012 R2 \u0434\u043e 6.3.9600.22824 , Microsoft Corp Windows Server 2012 (Server Core installation) \u0434\u043e 6.2.9200.25722 , Microsoft Corp Windows Server 2012 \u0434\u043e 6.2.9200.25722 , Microsoft Corp Windows Server 2016 (Server Core installation) \u0434\u043e 10.0.14393.8519 , Microsoft Corp Windows Server 2016 \u0434\u043e 10.0.14393.8519 , Microsoft Corp Windows Server 2025 \u0434\u043e 10.0.26100.6899 , Microsoft Corp Windows Server 2022, 23H2 Edition (Server Core installation) \u0434\u043e 10.0.25398.1913 , Microsoft Corp Windows Server 2025 (Server Core installation) \u0434\u043e 10.0.26100.6899 , Microsoft Corp Windows Server 2022 (Server Core installation) \u0434\u043e 10.0.20348.4294 , Microsoft Corp Windows Server 2022 \u0434\u043e 10.0.20348.4294 , Microsoft Corp Windows Server 2019 (Server Core installation) \u0434\u043e 10.0.17763.7919 , Microsoft Corp Windows Server 2019 \u0434\u043e 10.0.17763.7919 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 Windows Server Update Service (WSUS) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-502)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 Windows Server Update Service (WSUS) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287\nhttps://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv\nhttps://hawktrace.com/blog/CVE-2025-59287",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-502",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
CNVD-2025-26108
Vulnerability from cnvd - Published: 2025-10-31厂商已发布了漏洞修复程序,请及时关注更新: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
| Name | ['Microsoft Windows Server 2016', 'Microsoft Windows Server 2019', 'Microsoft Windows Server 2012', 'Microsoft Windows Server 2022', 'Microsoft Windows Server 2012 R2', 'Microsoft Windows Server 2022 23H2', 'Microsoft Windows Server 2025'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-59287",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-59287"
}
},
"description": "Microsoft Windows Server\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u5957\u670d\u52a1\u5668\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nMicrosoft Windows Server\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u5411WSUS\u670d\u52a1\u53d1\u9001\u7279\u5236\u7684\u8bf7\u6c42\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-26108",
"openTime": "2025-10-31",
"patchDescription": "Microsoft Windows Server\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u5957\u670d\u52a1\u5668\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nMicrosoft Windows Server\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u5411WSUS\u670d\u52a1\u53d1\u9001\u7279\u5236\u7684\u8bf7\u6c42\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft Windows Server\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2025-26108\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Microsoft Windows Server 2016",
"Microsoft Windows Server 2019",
"Microsoft Windows Server 2012",
"Microsoft Windows Server 2022",
"Microsoft Windows Server 2012 R2",
"Microsoft Windows Server 2022 23H2",
"Microsoft Windows Server 2025"
]
},
"referenceLink": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287",
"serverity": "\u9ad8",
"submitTime": "2025-10-17",
"title": "Microsoft Windows Server\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2025-26108\uff09"
}
FKIE_CVE-2025-59287
Vulnerability from fkie_nvd - Published: 2025-10-14 17:16 - Updated: 2025-11-12 14:33| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://hawktrace.com/blog/CVE-2025-59287 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-server-wsus-flaw-exploited-in-attacks/ | Press/Media Coverage | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vicarius.io/vsociety/posts/cve-2025-59287-detection-script-rce-vulnerability-in-windows-server-update-service | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vicarius.io/vsociety/posts/cve-2025-59287-mitigation-script-rce-vulnerability-in-windows-server-update-service | Mitigation, Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951 | Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | windows_server_2012 | - | |
| microsoft | windows_server_2012 | r2 | |
| microsoft | windows_server_2016 | * | |
| microsoft | windows_server_2019 | * | |
| microsoft | windows_server_2022 | * | |
| microsoft | windows_server_2022_23h2 | * | |
| microsoft | windows_server_2025 | * |
{
"cisaActionDue": "2025-11-14",
"cisaExploitAdd": "2025-10-24",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7200EF9B-2689-4E9E-BE9E-E00836A7D284",
"versionEndExcluding": "10.0.14393.8524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DDF9BE-8D0B-4027-B3F7-FFD96438E3EB",
"versionEndExcluding": "10.0.17763.7922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDAC36D7-54A0-456B-B176-17A0B9E63C7A",
"versionEndExcluding": "10.0.20348.4297",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA85BFD-9802-452E-97B1-6380554EF254",
"versionEndExcluding": "10.0.25398.1916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E5FFF5B-8745-47F6-A0B7-262AA43353BB",
"versionEndExcluding": "10.0.26100.6905",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network."
}
],
"id": "CVE-2025-59287",
"lastModified": "2025-11-12T14:33:19.727",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2025-10-14T17:16:11.670",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://hawktrace.com/blog/CVE-2025-59287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Press/Media Coverage"
],
"url": "https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-server-wsus-flaw-exploited-in-attacks/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-59287-detection-script-rce-vulnerability-in-windows-server-update-service"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-59287-mitigation-script-rce-vulnerability-in-windows-server-update-service"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
],
"url": "https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
GHSA-943J-4893-6RFQ
Vulnerability from github – Published: 2025-10-14 18:30 – Updated: 2025-11-11 15:31Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
{
"affected": [],
"aliases": [
"CVE-2025-59287"
],
"database_specific": {
"cwe_ids": [
"CWE-502"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-10-14T17:16:11Z",
"severity": "CRITICAL"
},
"details": "Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.",
"id": "GHSA-943j-4893-6rfq",
"modified": "2025-11-11T15:31:20Z",
"published": "2025-10-14T18:30:36Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59287"
},
{
"type": "WEB",
"url": "https://gist.github.com/hawktrace/880b54fb9c07ddb028baaae401bd3951"
},
{
"type": "WEB",
"url": "https://hawktrace.com/blog/CVE-2025-59287"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
},
{
"type": "WEB",
"url": "https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-windows-server-wsus-flaw-exploited-in-attacks"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-59287"
},
{
"type": "WEB",
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-59287-detection-script-rce-vulnerability-in-windows-server-update-service"
},
{
"type": "WEB",
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-59287-mitigation-script-rce-vulnerability-in-windows-server-update-service"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
ICSA-25-352-02
Vulnerability from csaf_cisa - Published: 2025-12-09 08:00 - Updated: 2025-12-18 18:23Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-0010 | — | ||
| Unresolved product id: CSAFPID-0014 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-0008 | — |
Vendor Fix
|
|
| Unresolved product id: CSAFPID-0012 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://download.schneider-electric.com/files?p_D… | self |
| https://download.schneider-electric.com/files?p_D… | self |
| https://www.se.com/us/en/download/document/7EN52-0390/ | external |
| https://raw.githubusercontent.com/cisagov/CSAF/de… | self |
| https://www.cisa.gov/news-events/ics-advisories/i… | self |
| https://www.cisa.gov/news-events/ics-alerts/ics-a… | external |
| https://www.cisa.gov/resources-tools/resources/ic… | external |
| https://www.cisa.gov/topics/industrial-control-systems | external |
| https://www.cisa.gov/sites/default/files/recommen… | external |
| https://www.cisa.gov/sites/default/files/publicat… | external |
| https://www.cisa.gov/news-events/news/targeted-cy… | external |
{
"document": {
"acknowledgments": [
{
"organization": "Schneider Electric CPCERT",
"summary": "reported this vulnerability to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "We strongly recommend the following industry cybersecurity best practices.\n\n* Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.\n* Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.\n* Place all controllers in locked cabinets and never leave them in the \u201cProgram\u201d mode.\n* Never connect programming software to any network other than the network intended for that device.\n* Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks.\n* Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation.\n* Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet.\n* When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.\n\nFor more information refer to the Schneider Electric [Recommended Cybersecurity Best Practices](https://www.se.com/us/en/download/document/7EN52-0390/) document.",
"title": "General Security Recommendations"
},
{
"category": "general",
"text": "This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process.\n\nFor further information related to cybersecurity in Schneider Electric\u0027s products, visit the company\u0027s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp",
"title": "For More Information"
},
{
"category": "legal_disclaimer",
"text": "THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS \u201cNOTIFICATION\u201d) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN \u201cAS-IS\u201d BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION",
"title": "LEGAL DISCLAIMER"
},
{
"category": "general",
"text": "Schneider\u0027s purpose is to create Impact by empowering all to make the most of our energy and resources, bridging progress and\r\nsustainability for all. We call this Life Is On.\n\nOur mission is to be the trusted partner in Sustainability and Efficiency.\n\nWe are a global industrial technology leader bringing world-leading expertise in electrification, automation and digitization to smart\r\nindustries, resilient infrastructure, future-proof data centers, intelligent buildings, and intuitive homes. Anchored by our deep\r\ndomain expertise, we provide integrated end-to-end lifecycle AI enabled Industrial IoT solutions with connected products, automation,\r\nsoftware and services, delivering digital twins to enable profitable growth for our customers.\n\nWe are a people company with an ecosystem of 150,000 colleagues and more than a million partners operating in over 100 countries\r\nto ensure proximity to our customers and stakeholders. We embrace diversity and inclusion in everything we do, guided by our\r\nmeaningful purpose of a sustainable future for all. \n\n www.se.com",
"title": "About Schneider Electric"
},
{
"category": "summary",
"text": "Schneider Electric is aware of a vulnerability disclosed by Microsoft in the Microsoft Windows Server Update \r\nServices (WSUS) used in the EcoStruxure\u2122 Foxboro DCS Advisor services. \n\nThe EcoStruxure\u2122 Foxboro DCS Advisor, an optional component of the [EcoStruxure\u2122 Foxboro DCS system](https://www.se.com/ww/en/work/products/industrial-automation-control/foxboro-dcs/), \r\nfacilitates remote connectivity and diagnostics by continuously monitoring key performance indicators (KPI) on \r\nthe I/A Series or Control Software system\u0027s process. \n\nFailure to apply the remediations provided below may risk a potential remote code execution event, which \r\ncould result in system-level privileges acquired by unauthorized parties.",
"title": "Overview"
},
{
"category": "legal_disclaimer",
"text": "This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy \u0026 Use policy (https://www.cisa.gov/privacy-policy).",
"title": "Legal Notice and Terms of Use"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Schneider Electric CPCERT SEVD-2025-343-02 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Schneider Electric CPCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing, Energy",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "France",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "EcoStruxure\u2122 Foxboro DCS Advisor - SEVD-2025-343-02 CSAF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-343-02\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=sevd-2025-343-02.json"
},
{
"category": "self",
"summary": "EcoStruxure\u2122 Foxboro DCS Advisor - SEVD-2025-343-02 PDF Version",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-343-02\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2025-343-02.pdf"
},
{
"category": "external",
"summary": "Recommended Cybersecurity Best Practices",
"url": "https://www.se.com/us/en/download/document/7EN52-0390/"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-352-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-352-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-352-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/targeted-cyber-intrusion-detection-and-mitigation-strategies-update-b"
}
],
"title": "Schneider Electric EcoStruxure Foxboro DCS Advisor",
"tracking": {
"current_release_date": "2025-12-18T18:23:06.311869Z",
"generator": {
"date": "2025-12-18T18:23:06.302862Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-352-02",
"initial_release_date": "2025-12-09T08:00:00.000000Z",
"revision_history": [
{
"date": "2025-12-09T08:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Original Release"
},
{
"date": "2025-12-18T18:23:06.311869Z",
"legacy_version": "CISA Republication",
"number": "2",
"summary": "Initial Republication of Schneider Electric CPCERT SEVD-2025-343-02 advisory"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "EcoStruxure\u2122 Foxboro DCS Advisor services",
"product": {
"name": "EcoStruxure\u2122 Foxboro DCS Advisor services",
"product_id": "CSAFPID-0001"
}
}
],
"category": "vendor",
"name": "Schneider Electric"
},
{
"branches": [
{
"category": "product_name",
"name": "Windows Server Update Services",
"product": {
"name": "Microsoft Windows Server Update Services",
"product_id": "CSAFPID-0002"
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.14393.8524",
"product": {
"name": "Microsoft Windows Server 2016 \u003c10.0.14393.8524",
"product_id": "CSAFPID-0003"
}
},
{
"category": "product_version",
"name": "10.0.14393.8524",
"product": {
"name": "Microsoft Windows Server 2016 10.0.14393.8524",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Windows Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.20348.4297",
"product": {
"name": "Microsoft Windows Server 2022 \u003c10.0.20348.4297",
"product_id": "CSAFPID-0005"
}
},
{
"category": "product_version",
"name": "10.0.20348.4297",
"product": {
"name": "Microsoft Windows Server 2022 10.0.20348.4297",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Windows Server Update Services application installed on Microsoft Windows Server 2016 \u003c10.0.14393.8524",
"product_id": "CSAFPID-0007"
},
"product_reference": "CSAFPID-0002",
"relates_to_product_reference": "CSAFPID-0003"
},
{
"category": "installed_with",
"full_product_name": {
"name": "EcoStruxure\u2122 Foxboro DCS Advisor services installed with Windows Server Update Services application installed on Microsoft Windows Server 2016 \u003c10.0.14393.8524",
"product_id": "CSAFPID-0008"
},
"product_reference": "CSAFPID-0001",
"relates_to_product_reference": "CSAFPID-0007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Microsoft Windows Server Update Services installed on Microsoft Windows Server 2016 10.0.14393.8524",
"product_id": "CSAFPID-0009"
},
"product_reference": "CSAFPID-0002",
"relates_to_product_reference": "CSAFPID-0004"
},
{
"category": "installed_with",
"full_product_name": {
"name": "EcoStruxure\u2122 Foxboro DCS Advisor services installed with Microsoft Windows Server Update Services installed on Microsoft Windows Server 2016 10.0.14393.8524",
"product_id": "CSAFPID-0010"
},
"product_reference": "CSAFPID-0001",
"relates_to_product_reference": "CSAFPID-0009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Microsoft Windows Server Update Services installed on Microsoft Windows Server 2022 \u003c10.0.20348.4297",
"product_id": "CSAFPID-0011"
},
"product_reference": "CSAFPID-0002",
"relates_to_product_reference": "CSAFPID-0005"
},
{
"category": "installed_with",
"full_product_name": {
"name": "EcoStruxure\u2122 Foxboro DCS Advisor services installed with Microsoft Windows Server Update Services installed on Microsoft Windows Server 2022 \u003c10.0.20348.4297",
"product_id": "CSAFPID-0012"
},
"product_reference": "CSAFPID-0001",
"relates_to_product_reference": "CSAFPID-0011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Microsoft Windows Server Update Services installed on Microsoft Windows Server 2022 10.0.20348.4297",
"product_id": "CSAFPID-0013"
},
"product_reference": "CSAFPID-0002",
"relates_to_product_reference": "CSAFPID-0006"
},
{
"category": "installed_with",
"full_product_name": {
"name": "EcoStruxure\u2122 Foxboro DCS Advisor services installed with Microsoft Windows Server Update Services installed on Microsoft Windows Server 2022 10.0.20348.4297",
"product_id": "CSAFPID-0014"
},
"product_reference": "CSAFPID-0001",
"relates_to_product_reference": "CSAFPID-0013"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-59287",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "details",
"text": "A vulnerability disclosed by Microsoft in the Microsoft Windows Server Update Services (WSUS) application impacts servers running Schneider Electric EcoStruxure\u2122 Foxboro DCS Advisor. CVE ID: CVE-2025-59287. Additional information about CVE-2025-59287can be found here: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287",
"title": "Vulnerability Details"
},
{
"category": "description",
"text": "Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-0010",
"CSAFPID-0014"
],
"known_affected": [
"CSAFPID-0008",
"CSAFPID-0012"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Patch KB5070882 from Microsoft includes a fix for this vulnerability and is \r\navailable for download directly from WSUS. \r\nReboot may be required to complete patch update. \r\nCustomers should contact and work with [Global Customer Support](https://pasupport.se.com/home) to \r\nverify update has been completed.",
"product_ids": [
"CSAFPID-0008"
],
"restart_required": {
"category": "system"
}
},
{
"category": "vendor_fix",
"details": "Patch KB5070884 from Microsoft includes a fix for this vulnerability and is \r\navailable for download directly from WSUS. \r\nReboot may be required to complete patch update. \r\nCustomers should contact and work with [Global Customer Support](https://pasupport.se.com/home) to \r\nverify update has been completed. ",
"product_ids": [
"CSAFPID-0012"
],
"restart_required": {
"category": "system"
}
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0008",
"CSAFPID-0012"
]
}
],
"title": "CVE-2025-59287"
}
]
}
MSRC_CVE-2025-59287
Vulnerability from csaf_microsoft - Published: 2025-10-14 07:00 - Updated: 2025-10-24 07:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Windows Server 2012 6.2.9200.25728
Windows Server 2012
|
6.2.9200.25728 | ||
|
Windows Server 2012 (Server Core installation) 6.2.9200.25728
Windows Server 2012 (Server Core installation)
|
6.2.9200.25728 | ||
|
Windows Server 2012 R2 6.3.9600.22826
Windows Server 2012 R2
|
6.3.9600.22826 | ||
|
Windows Server 2012 R2 (Server Core installation) 6.3.9600.22826
Windows Server 2012 R2 (Server Core installation)
|
6.3.9600.22826 | ||
|
Windows Server 2016 10.0.14393.8524
Windows Server 2016
|
10.0.14393.8524 | ||
|
Windows Server 2016 (Server Core installation) 10.0.14393.8524
Windows Server 2016 (Server Core installation)
|
10.0.14393.8524 | ||
|
Windows Server 2019 10.0.17763.7922
Windows Server 2019
|
10.0.17763.7922 | ||
|
Windows Server 2019 (Server Core installation) 10.0.17763.7922
Windows Server 2019 (Server Core installation)
|
10.0.17763.7922 | ||
|
Windows Server 2022 10.0.20348.4297
Windows Server 2022
|
10.0.20348.4297 | ||
|
Windows Server 2022 (Server Core installation) 10.0.20348.4297
Windows Server 2022 (Server Core installation)
|
10.0.20348.4297 | ||
|
Windows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.1916
Windows Server 2022, 23H2 Edition (Server Core installation)
|
10.0.25398.1916 | ||
|
Windows Server 2025 10.0.26100.6905
Windows Server 2025
|
10.0.26100.6905 | ||
|
Windows Server 2025 (Server Core installation) 10.0.26100.6905
Windows Server 2025 (Server Core installation)
|
10.0.26100.6905 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Windows Server 2025 (Server Core installation) <10.0.26100.6905
Windows Server 2025 (Server Core installation)
|
<10.0.26100.6905 |
Vendor Fix
fix
Vendor Fix
fix
|
|
|
Windows Server 2025 <10.0.26100.6905
Windows Server 2025
|
<10.0.26100.6905 |
Vendor Fix
fix
Vendor Fix
fix
|
|
|
Windows Server 2022, 23H2 Edition (Server Core installation) <10.0.25398.1916
Windows Server 2022, 23H2 Edition (Server Core installation)
|
<10.0.25398.1916 |
Vendor Fix
fix
|
|
|
Windows Server 2022 (Server Core installation) <10.0.20348.4297
Windows Server 2022 (Server Core installation)
|
<10.0.20348.4297 |
Vendor Fix
fix
Vendor Fix
fix
|
|
|
Windows Server 2022 <10.0.20348.4297
Windows Server 2022
|
<10.0.20348.4297 |
Vendor Fix
fix
Vendor Fix
fix
|
|
|
Windows Server 2019 (Server Core installation) <10.0.17763.7922
Windows Server 2019 (Server Core installation)
|
<10.0.17763.7922 |
Vendor Fix
fix
|
|
|
Windows Server 2019 <10.0.17763.7922
Windows Server 2019
|
<10.0.17763.7922 |
Vendor Fix
fix
|
|
|
Windows Server 2016 (Server Core installation) <10.0.14393.8524
Windows Server 2016 (Server Core installation)
|
<10.0.14393.8524 |
Vendor Fix
fix
|
|
|
Windows Server 2016 <10.0.14393.8524
Windows Server 2016
|
<10.0.14393.8524 |
Vendor Fix
fix
|
|
|
Windows Server 2012 R2 (Server Core installation) <6.3.9600.22826
Windows Server 2012 R2 (Server Core installation)
|
<6.3.9600.22826 |
Vendor Fix
fix
|
|
|
Windows Server 2012 R2 <6.3.9600.22826
Windows Server 2012 R2
|
<6.3.9600.22826 |
Vendor Fix
fix
|
|
|
Windows Server 2012 (Server Core installation) <6.2.9200.25728
Windows Server 2012 (Server Core installation)
|
<6.2.9200.25728 |
Vendor Fix
fix
|
|
|
Windows Server 2012 <6.2.9200.25728
Windows Server 2012
|
<6.2.9200.25728 |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://msrc.microsoft.com/update-guide/vulnerabi… | self |
| https://msrc.microsoft.com/csaf/advisories/2025/m… | self |
| https://www.microsoft.com/en-us/msrc/exploitabili… | external |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/update-guide/vulnerabi… | self |
| https://msrc.microsoft.com/csaf/advisories/2025/m… | self |
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://twitter.com/mwulftange\"\u003eMarkus Wulftange\u003c/a\u003e with \u003ca href=\"https://code-white.com/\"\u003eCODE WHITE GmbH\u003c/a\u003e"
]
},
{
"names": [
"MEOW"
]
},
{
"names": [
"f7d8c52bec79e42795cf15888b85cbad"
]
},
{
"names": [
"MEOW"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59287 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
},
{
"category": "self",
"summary": "CVE-2025-59287 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-59287.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Windows Server Update Service (WSUS) Remote Code Execution Vulnerability",
"tracking": {
"current_release_date": "2025-10-24T07:00:00.000Z",
"generator": {
"date": "2026-02-22T17:24:08.042Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-59287",
"initial_release_date": "2025-10-14T07:00:00.000Z",
"revision_history": [
{
"date": "2025-10-14T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-10-23T07:00:00.000Z",
"legacy_version": "2",
"number": "2",
"summary": "To comprehensively address CVE-2025-59287, Microsoft has released an out of band security update for the following supported versions of Windows Server: Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), and Windows Server 2025. Note that a reboot will be required after you install the updates."
},
{
"date": "2025-10-24T07:00:00.000Z",
"legacy_version": "2.1",
"number": "3",
"summary": "Updated links to security updates. This is an informational change only."
},
{
"date": "2025-10-24T07:00:00.000Z",
"legacy_version": "3",
"number": "4",
"summary": "Security hotpatch updates are now available for supported versions of Windows Server 2022 and Windows Server 2025. Note that a reboot will be required after you install these hotpatch updates."
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.17763.7922",
"product": {
"name": "Windows Server 2019 \u003c10.0.17763.7922",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "10.0.17763.7922",
"product": {
"name": "Windows Server 2019 10.0.17763.7922",
"product_id": "11571"
}
}
],
"category": "product_name",
"name": "Windows Server 2019"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.17763.7922",
"product": {
"name": "Windows Server 2019 (Server Core installation) \u003c10.0.17763.7922",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "10.0.17763.7922",
"product": {
"name": "Windows Server 2019 (Server Core installation) 10.0.17763.7922",
"product_id": "11572"
}
}
],
"category": "product_name",
"name": "Windows Server 2019 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.20348.4297",
"product": {
"name": "Windows Server 2022 \u003c10.0.20348.4297",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "10.0.20348.4297",
"product": {
"name": "Windows Server 2022 10.0.20348.4297",
"product_id": "11923"
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.20348.4297",
"product": {
"name": "Windows Server 2022 (Server Core installation) \u003c10.0.20348.4297",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "10.0.20348.4297",
"product": {
"name": "Windows Server 2022 (Server Core installation) 10.0.20348.4297",
"product_id": "11924"
}
}
],
"category": "product_name",
"name": "Windows Server 2022 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.26100.6905",
"product": {
"name": "Windows Server 2025 (Server Core installation) \u003c10.0.26100.6905",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "10.0.26100.6905",
"product": {
"name": "Windows Server 2025 (Server Core installation) 10.0.26100.6905",
"product_id": "12437"
}
}
],
"category": "product_name",
"name": "Windows Server 2025 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.25398.1916",
"product": {
"name": "Windows Server 2022, 23H2 Edition (Server Core installation) \u003c10.0.25398.1916",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "10.0.25398.1916",
"product": {
"name": "Windows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.1916",
"product_id": "12244"
}
}
],
"category": "product_name",
"name": "Windows Server 2022, 23H2 Edition (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.26100.6905",
"product": {
"name": "Windows Server 2025 \u003c10.0.26100.6905",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "10.0.26100.6905",
"product": {
"name": "Windows Server 2025 10.0.26100.6905",
"product_id": "12436"
}
}
],
"category": "product_name",
"name": "Windows Server 2025"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.14393.8524",
"product": {
"name": "Windows Server 2016 \u003c10.0.14393.8524",
"product_id": "9"
}
},
{
"category": "product_version",
"name": "10.0.14393.8524",
"product": {
"name": "Windows Server 2016 10.0.14393.8524",
"product_id": "10816"
}
}
],
"category": "product_name",
"name": "Windows Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.14393.8524",
"product": {
"name": "Windows Server 2016 (Server Core installation) \u003c10.0.14393.8524",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "10.0.14393.8524",
"product": {
"name": "Windows Server 2016 (Server Core installation) 10.0.14393.8524",
"product_id": "10855"
}
}
],
"category": "product_name",
"name": "Windows Server 2016 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.2.9200.25728",
"product": {
"name": "Windows Server 2012 \u003c6.2.9200.25728",
"product_id": "13"
}
},
{
"category": "product_version",
"name": "6.2.9200.25728",
"product": {
"name": "Windows Server 2012 6.2.9200.25728",
"product_id": "10378"
}
}
],
"category": "product_name",
"name": "Windows Server 2012"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.2.9200.25728",
"product": {
"name": "Windows Server 2012 (Server Core installation) \u003c6.2.9200.25728",
"product_id": "12"
}
},
{
"category": "product_version",
"name": "6.2.9200.25728",
"product": {
"name": "Windows Server 2012 (Server Core installation) 6.2.9200.25728",
"product_id": "10379"
}
}
],
"category": "product_name",
"name": "Windows Server 2012 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.3.9600.22826",
"product": {
"name": "Windows Server 2012 R2 \u003c6.3.9600.22826",
"product_id": "11"
}
},
{
"category": "product_version",
"name": "6.3.9600.22826",
"product": {
"name": "Windows Server 2012 R2 6.3.9600.22826",
"product_id": "10483"
}
}
],
"category": "product_name",
"name": "Windows Server 2012 R2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.3.9600.22826",
"product": {
"name": "Windows Server 2012 R2 (Server Core installation) \u003c6.3.9600.22826",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "6.3.9600.22826",
"product": {
"name": "Windows Server 2012 R2 (Server Core installation) 6.3.9600.22826",
"product_id": "10543"
}
}
],
"category": "product_name",
"name": "Windows Server 2012 R2 (Server Core installation)"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-59287",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "A remote, unauthenticated attacker could send a crafted event that triggers unsafe object deserialization in a legacy serialization mechanism, resulting in remote code execution.",
"title": "How could an attacker exploit this vulnerability?"
},
{
"category": "faq",
"text": "To fully address this vulnerability:\nWindows Server customers should install the out-of-band update released on October 23, 2025., Windows Servers enrolled into the hotpatch program should install the out-of-band standalone security update released on October 24, 2025.\nIf you cannot install the update immediately see the Workaround section for actions you can take to be protected.",
"title": "What actions do I need to take to be protected from this vulnerability?"
},
{
"category": "faq",
"text": "Yes. After you install the update you will need to reboot your system.\nYes. A reboot will be required only on servers that have WSUS enabled. This update will not reset the previous baseline.",
"title": "Will the out-of-band update released on October 23, 2025 require a Windows server reboot?"
},
{
"category": "faq",
"text": "The update is available through the following channels:\nFor customers who automatically install updates, this update will be downloaded and installed automatically from Windows Update and Microsoft Update., The standalone package for this update is available on the Microsoft Update Catalog website., This update will automatically sync with Windows Server Update Services (WSUS).\nWindows Server 2022:\nFor customers who automatically install updates, this update will be downloaded and installed automatically from Windows Update., This update will automatically sync with Windows Server Update Services (WSUS).\nWindows Server 2025:\nFor customers who automatically install updates, this update will be downloaded and installed automatically from Windows Update only.",
"title": "How I do get the October 23, 2025 out of band security update?"
},
{
"category": "faq",
"text": "Microsoft has updated the Exploit Code Maturity metric of the CVSS Temporal score from Unproven (U) to Proof-of-Concept (P) after confirming the availability of publicly disclosed PoC code for this CVE.",
"title": "Why did the Temporal CVSS score change?"
},
{
"category": "faq",
"text": "Yes. An updates scan file will be available at the time of, or shortly after, the release.",
"title": "Will an updated Windows Update offline scan file, Wsusscn2.cab, with this new security update be available?"
}
],
"product_status": {
"fixed": [
"10378",
"10379",
"10483",
"10543",
"10816",
"10855",
"11571",
"11572",
"11923",
"11924",
"12244",
"12436",
"12437"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59287 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
},
{
"category": "self",
"summary": "CVE-2025-59287 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-59287.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "10.0.17763.7922:Security Update:https://support.microsoft.com/help/5070883",
"product_ids": [
"7",
"6"
],
"url": "https://support.microsoft.com/help/5070883"
},
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "10.0.20348.4297:Security Update:https://support.microsoft.com/help/5070884",
"product_ids": [
"5",
"4"
],
"url": "https://support.microsoft.com/help/5070884"
},
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "10.0.20348.4297:Standalone Security Update:https://support.microsoft.com/help/5070892",
"product_ids": [
"5",
"4"
],
"url": "https://support.microsoft.com/help/5070892"
},
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "10.0.26100.6905:Security Update:https://support.microsoft.com/help/5070881",
"product_ids": [
"1",
"2"
],
"url": "https://support.microsoft.com/help/5070881"
},
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "10.0.26100.6905:Standalone Security Update:https://support.microsoft.com/help/5070893",
"product_ids": [
"1",
"2"
],
"url": "https://support.microsoft.com/help/5070893"
},
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "10.0.25398.1916:Security Update:https://support.microsoft.com/help/5070879",
"product_ids": [
"3"
],
"url": "https://support.microsoft.com/help/5070879"
},
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "10.0.14393.8524:Security Update:https://support.microsoft.com/help/5070882",
"product_ids": [
"9",
"8"
],
"url": "https://support.microsoft.com/help/5070882"
},
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "6.2.9200.25728:Security Update:https://support.microsoft.com/help/5070887",
"product_ids": [
"13",
"12"
],
"url": "https://support.microsoft.com/help/5070887"
},
{
"category": "vendor_fix",
"date": "2025-10-14T07:00:00.000Z",
"details": "6.3.9600.22826:Security Update:https://support.microsoft.com/help/5070886",
"product_ids": [
"11",
"10"
],
"url": "https://support.microsoft.com/help/5070886"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13"
]
}
],
"threats": [
{
"category": "impact",
"details": "Remote Code Execution"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely"
}
],
"title": "Windows Server Update Service (WSUS) Remote Code Execution Vulnerability"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.