Security
Headlines
HeadlinesLatestCVEs

Source

Microsoft Security Response Center

CVE-2025-59189: Microsoft Brokering File System Elevation of Privilege Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to have a deep understanding of the system. Successful exploitation is not guaranteed and depends on a combination of factors that might include the environment, system configuration, and the presence of additional security measures.

Microsoft Security Response Center
#vulnerability#microsoft#Microsoft Brokering File System#Security Vulnerability
CVE-2025-59205: Windows Graphics Component Elevation of Privilege Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.

CVE-2025-59203: Windows State Repository API Server File Information Disclosure Vulnerability

Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally.

CVE-2025-58737: Remote Desktop Protocol Remote Code Execution Vulnerability

**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?** An attacker must send the user a malicious file and convince them to open it.

CVE-2025-59194: Windows Kernel Elevation of Privilege Vulnerability

Use of uninitialized resource in Windows Kernel allows an unauthorized attacker to elevate privileges locally.

CVE-2025-59193: Windows Management Services Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.

CVE-2025-59197: Windows ETL Channel Information Disclosure Vulnerability

Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally.