Security
Headlines
HeadlinesLatestCVEs

Latest News

CVE-2025-26674: Windows Media Remote Code Execution Vulnerability

Heap-based buffer overflow in Microsoft Windows Codecs Library allows an authorized attacker to execute code locally.

Microsoft Security Response Center
#vulnerability#windows#microsoft#rce#buffer_overflow#auth#Windows Media#Security Vulnerability
CVE-2025-27483: NTFS Elevation of Privilege Vulnerability

**Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?** The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.

CVE-2025-26676: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

**What type of information could be disclosed by this vulnerability?** An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.

CVE-2025-26644: Windows Hello Spoofing Vulnerability

Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally.

CVE-2025-27489: Azure Local Elevation of Privilege Vulnerability

Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally.

CVE-2025-27740: Active Directory Certificate Services Elevation of Privilege Vulnerability

**How could an attacker exploit this vulnerability?** An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow elevation of privilege to System.

CVE-2025-27478: Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.