Security
Headlines
HeadlinesLatestCVEs

Source

Microsoft Security Response Center

CVE-2025-55232: Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability

Customers should make sure the HPC Pack clusters are running in a trusted network secured by firewall rules especially for the TCP port 5999.

Microsoft Security Response Center
#vulnerability#microsoft#rce#Microsoft High Performance Compute Pack (HPC)#Security Vulnerability
CVE-2025-55223: DirectX Graphics Kernel Elevation of Privilege Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.

CVE-2025-54913: Windows UI XAML Maps MapControlSettings Elevation of Privilege Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows UI XAML Phone DatePickerFlyout allows an authorized attacker to elevate privileges locally.

CVE-2025-54919: Windows Graphics Component Remote Code Execution Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.

CVE-2025-54918: Windows NTLM Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited this vulnerability?** An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

CVE-2025-55317: Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

Improper link resolution before file access ('link following') in Microsoft Teams allows an authorized attacker to elevate privileges locally.

CVE-2025-55228: Windows Graphics Component Remote Code Execution Vulnerability

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally.