Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

CVE-2025-53720: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

**How could an attacker exploit this vulnerability?** An attacker authenticated on the domain could exploit this vulnerability by tricking a domain-joined user into sending a request to a malicious server via the Routing and Remote Access Service (RRAS) Snap-in. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.

Microsoft Security Response Center
#vulnerability#windows#rce#auth#Windows Routing and Remote Access Service (RRAS)#Security Vulnerability
CVE-2025-53154: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

**What privileges could be gained by an attacker who successfully exploited the vulnerability?** An attacker who successfully exploited this vulnerability could gain administrator privileges.

CVE-2025-53155: Windows Hyper-V Elevation of Privilege Vulnerability

**How could an attacker exploit this vulnerability?** An authenticated attacker could create a crafted vhdx file and can call the vhdmp api with vhdx as one of the arguments.

CVE-2025-53724: Windows Push Notifications Apps Elevation of Privilege Vulnerability

Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.

CVE-2025-53156: Windows Storage Port Driver Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally.

CVE-2025-53136: NT OS Kernel Information Disclosure Vulnerability

Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally.

CVE-2025-53134: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows Ancillary Function Driver for WinSock allows an authorized attacker to disclose information locally.

CVE-2025-53147: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

**According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?** Successful exploitation of this vulnerability requires an attacker to win a race condition.