Skip to main content

Microsoft security update summary's for July 2025

  • July 8, 2025
  • 13 replies
  • 199 views

TripleHelix
Moderator
Forum|alt.badge.img+63

July 2025 Security Updates

This release consists of the following 130 Microsoft CVEs:
Tag
CVE Base Score CVSS Vector Exploitability FAQs? Workarounds? Mitigations?

Service Fabric CVE-2025-21195
Windows Kernel CVE-2025-26636
Remote Desktop Client CVE-2025-33054
Windows Visual Basic Scripting CVE-2025-47159
Microsoft Intune CVE-2025-47178
Virtual Hard Disk (VHDX) CVE-2025-47971
Microsoft Input Method Editor (IME) CVE-2025-47972
Virtual Hard Disk (VHDX) CVE-2025-47973
Windows SSDP Service CVE-2025-47975
Windows SSDP Service CVE-2025-47976
Windows Kerberos CVE-2025-47978
Windows Imaging Component CVE-2025-47980
Windows SPNEGO Extended Negotiation CVE-2025-47981
Windows Storage VSP Driver CVE-2025-47982
Windows GDI CVE-2025-47984
Windows Event Tracing CVE-2025-47985
Universal Print Management Service CVE-2025-47986
Windows Cred SSProvider Protocol CVE-2025-47987
Azure Monitor Agent CVE-2025-47988
Microsoft Input Method Editor (IME) CVE-2025-47991
Microsoft PC Manager CVE-2025-47993
Microsoft Office CVE-2025-47994
Windows MBT Transport driver CVE-2025-47996
Windows Routing and Remote Access Service (RRAS) CVE-2025-47998
Role: Windows Hyper-V CVE-2025-47999
Windows Connected Devices Platform Service CVE-2025-48000
Windows BitLocker CVE-2025-48001
Role: Windows Hyper-V CVE-2025-48002
Windows BitLocker CVE-2025-48003
Windows Update Service CVE-2025-48799
Windows BitLocker CVE-2025-48800
Windows SMB CVE-2025-48802
Windows Virtualization-Based Security (VBS) Enclave CVE-2025-48803
Windows BitLocker CVE-2025-48804
Microsoft MPEG-2 Video Extension CVE-2025-48805
Microsoft MPEG-2 Video Extension CVE-2025-48806
Windows Kernel CVE-2025-48808
Windows Kernel CVE-2025-48809
Windows Secure Kernel Mode CVE-2025-48810
Windows Virtualization-Based Security (VBS) Enclave CVE-2025-48811
Microsoft Office Excel CVE-2025-48812
Windows Remote Desktop Licensing Service CVE-2025-48814
Windows SSDP Service CVE-2025-48815
HID class driver CVE-2025-48816
Remote Desktop Client CVE-2025-48817
Windows BitLocker CVE-2025-48818
Windows Universal Plug and Play (UPnP) Device Host CVE-2025-48819
Windows AppX Deployment Service CVE-2025-48820
Windows Universal Plug and Play (UPnP) Device Host CVE-2025-48821
Role: Windows Hyper-V CVE-2025-48822
Windows Cryptographic Services CVE-2025-48823
Windows Routing and Remote Access Service (RRAS) CVE-2025-48824
Windows Routing and Remote Access Service (RRAS) CVE-2025-49657
Windows TDX.sys CVE-2025-49658
Windows TDX.sys CVE-2025-49659
Windows Event Tracing CVE-2025-49660
Windows Ancillary Function Driver for WinSock CVE-2025-49661
Windows Routing and Remote Access Service (RRAS) CVE-2025-49663
Windows User-Mode Driver Framework Host CVE-2025-49664
Workspace Broker CVE-2025-49665
Windows Kernel CVE-2025-49666
Windows Win32K - ICOMP CVE-2025-49667
Windows Routing and Remote Access Service (RRAS) CVE-2025-49668
Windows Routing and Remote Access Service (RRAS) CVE-2025-49669
Windows Routing and Remote Access Service (RRAS) CVE-2025-49670
Windows Routing and Remote Access Service (RRAS) CVE-2025-49671
Windows Routing and Remote Access Service (RRAS) CVE-2025-49672
Windows Routing and Remote Access Service (RRAS) CVE-2025-49673
Windows Routing and Remote Access Service (RRAS) CVE-2025-49674
Kernel Streaming WOW Thunk Service Driver CVE-2025-49675
Windows Routing and Remote Access Service (RRAS) CVE-2025-49676
Microsoft Brokering File System CVE-2025-49677
Windows NTFS CVE-2025-49678
Windows Shell CVE-2025-49679
Windows Performance Recorder CVE-2025-49680
Windows Routing and Remote Access Service (RRAS) CVE-2025-49681
Windows Media CVE-2025-49682
Virtual Hard Disk (VHDX) CVE-2025-49683
Storage Port Driver CVE-2025-49684
Microsoft Windows Search Component CVE-2025-49685
Windows TCP/IP CVE-2025-49686
Microsoft Input Method Editor (IME) CVE-2025-49687
Windows Routing and Remote Access Service (RRAS) CVE-2025-49688
Virtual Hard Disk (VHDX) CVE-2025-49689
Capability Access Management Service (camsvc) CVE-2025-49690
Windows Media CVE-2025-49691
Microsoft Brokering File System CVE-2025-49693
Microsoft Brokering File System CVE-2025-49694
Microsoft Office CVE-2025-49695
Microsoft Office CVE-2025-49696
Microsoft Office CVE-2025-49697
Microsoft Office Word CVE-2025-49698
Microsoft Office CVE-2025-49699 Microsoft Office Word CVE-2025-49700
Microsoft Office SharePoint CVE-2025-49701
Microsoft Office CVE-2025-49702
Microsoft Office Word CVE-2025-49703
Microsoft Office SharePoint CVE-2025-49704
Microsoft Office PowerPoint CVE-2025-49705
Microsoft Office SharePoint CVE-2025-49706
Microsoft Office Excel CVE-2025-49711
Microsoft Edge (Chromium-based) CVE-2025-49713
Visual Studio Code - Python extension CVE-2025-49714
Windows Netlogon CVE-2025-49716
SQL Server CVE-2025-49717
SQL Server CVE-2025-49718
SQL Server CVE-2025-49719
Windows Fast FAT Driver CVE-2025-49721
Windows Print Spooler Components CVE-2025-49722
Windows StateRepository API CVE-2025-49723
Windows Connected Devices Platform Service CVE-2025-49724
Windows Notification CVE-2025-49725
Windows Notification CVE-2025-49726
Windows Win32K - GRFX CVE-2025-49727
Windows Routing and Remote Access Service (RRAS) CVE-2025-49729
Microsoft Windows QoS scheduler CVE-2025-49730
Microsoft Teams CVE-2025-49731
Microsoft Graphics Component CVE-2025-49732
Windows Win32K - ICOMP CVE-2025-49733
Windows KDC Proxy Service (KPSSVC) CVE-2025-49735
Microsoft Teams CVE-2025-49737
Microsoft PC Manager CVE-2025-49738
Visual Studio CVE-2025-49739
Windows SmartScreen CVE-2025-49740
Microsoft Edge (Chromium-based) CVE-2025-49741
Microsoft Graphics Component CVE-2025-49742
Microsoft Graphics Component CVE-2025-49744
Windows Routing and Remote Access Service (RRAS) CVE-2025-49753
Office Developer Platform CVE-2025-49756
Windows Storage CVE-2025-49760

We are republishing 10 non-Microsoft CVEs:
CNA Tag CVE FAQs? Workarounds? Mitigations?
MITRE Visual Studio CVE-2025-27613
MITRE Visual Studio CVE-2025-27614
AMD AMD Store Queue CVE-2025-36350
AMD AMD L1 Data Queue CVE-2025-36357
MITRE Visual Studio CVE-2025-46334
MITRE Visual Studio CVE-2025-46835
MITRE Visual Studio CVE-2025-48384
MITRE Visual Studio CVE-2025-48385
MITRE Visual Studio CVE-2025-48386
Chrome Microsoft Edge (Chromium-based) CVE-2025-6554

Security Update Guide Blog Posts
Date
Blog Post
November 12, 2024 Toward greater transparency: Publishing machine-readable CSAF files
June 27, 2024 Toward greater transparency: Unveiling Cloud Service CVEs
April 9, 2024 Toward greater transparency: Security Update Guide now shares CWEs for CVEs
January 6, 2023 Publishing CBL-Mariner CVEs on the Security Update Guide CVRF API
January 11, 2022 Coming Soon: New Security Update Guide Notification System
February 9, 2021 Continuing to Listen: Good News about the Security Update Guide API
January 13, 2021 Security Update Guide Supports CVEs Assigned by Industry Partners
December 8, 2020 Security Update Guide: Let’s keep the conversation going
November 9, 2020 Vulnerability Descriptions in the New Version of the Security Update Guide

Relevant Resources

  • The new Hotpatching feature is now generally available. Please see Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
  • Windows 10 and Windows 11 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10 and Windows 11, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 and Windows 11 operating systems, please see Windows Lifecycle Facts Sheet.
  • Microsoft is improving Windows Release Notes. For more information, please see What's next for Windows release notes.
  • A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
  • In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
  • Customers running Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See 4522133 for more information.

Known Issues
You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.

For more information about Windows Known Issues, please see Windows message center (links to currently-supported versions of Windows are in the left pane).

KB Article Applies To
5062554 Windows 10, version 21H2, Windows 10, version 22H2
5062557 Windows 10, version 1809, Windows Server 2019
5062560 Windows 10, version 1607, Windows Server 2016
5062572 Windows Server 2022
5062618 Windows Server 2008 (Security-only update)
5062624 Windows Server 2008 (Monthly Rollup)
Released: Jul 8, 2025

July 2025 Security Updates - Release Notes - Security Update Guide - Microsoft

13 replies

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 8, 2025
My updates from today!

 


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 8, 2025

CVEs have been published or revised in the Security Update Guide

July 8, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2022-23278

  • Title: Microsoft Defender for Endpoint Spoofing Vulnerability
  • Version: 3.1
  • Reason for revision: Updated links to security updates. This is an informational change only.
  • Originally released: March 8, 2022
  • Last updated: July 8, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2022-33637

  • Title: Microsoft Defender for Endpoint Tampering Vulnerability
  • Version: 1.2
  • Reason for revision: Updated links to security updates. This is an informational change only.
  • Originally released: July 12, 2022
  • Last updated: July 8, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2024-29187

  • Title: GitHub: CVE-2024-29187 WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM
  • Version: 5.0
  • Reason for revision: In the Security Updates table added Windows 11 HLK 24H2 because this developer kit is also affected by this vulnerability. Microsoft strongly recommends that customers using this product install the update to be fully protected from the vulnerability. See the FAQs section of this vulnerability for more information.
  • Originally released: June 11, 2024
  • Last updated: July 8, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2024-43614

  • Title: Microsoft Defender for Endpoint for Linux Spoofing Vulnerability
  • Version: 1.1
  • Reason for revision: Updated links to security updates. This is an informational change only.
  • Originally released: October 8, 2024
  • Last updated: July 8, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2024-49000

  • Title: SQL Server Native Client Remote Code Execution Vulnerability
  • Version: 2.0
  • Reason for revision: CVE-2024-49000 re-released to address a regression introduced in the original updates to both Security update for SQL 2016 Azure Connect Feature Pack and Security update for SQL Server 2016 SP3 RTM+GDR. Customers affected by the regression should install the security updates released on July 8, 2025. See the updated information in the Security Updates table.
  • Originally released: November 12, 2024
  • Last updated: July 8, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2025-26684

  • Title: Microsoft Defender Elevation of Privilege Vulnerability
  • Version: 1.1
  • Reason for revision: Updated links to security updates. This is an informational change only.
  • Originally released: May 13, 2025
  • Last updated: July 8, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2025-30399

  • Title: .NET and Visual Studio Remote Code Execution Vulnerability
  • Version: 2.0
  • Reason for revision: Revised the Security Updates table to include PowerShell 7.4 and PowerShell 7.5 because these versions of PowerShell 7 are affected by this vulnerability. See [https://github.com/PowerShell/Announcements/issues/77](https://github.com/PowerShell/Announcements/issues/77) for more information.
  • Originally released: June 10, 2025
  • Last updated: July 8, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2025-47161

  • Title: Microsoft Defender for Endpoint Elevation of Privilege Vulnerability
  • Version: 1.1
  • Reason for revision: Updated links to security updates. This is an informational change only.
  • Originally released: May 15, 2025
  • Last updated: July 8, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes
 

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 11, 2025

CVEs have been published or revised in the Security Update Guide

July 10, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2023-24932

  • Title: Secure Boot Security Feature Bypass Vulnerability
  • Version: 6.0
  • Reason for revision: Microsoft has released July 8, 2025 security updates for all supported versions of Windows that provide new mitigations to protect against this vulnerability; however, these mitigations are not enabled by default. After you have installed the updates, follow the steps outlined in [KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932](https://support.microsoft.com/help/5025885) to enable these protections. All Windows devices should have the the July 8, 2025 security updates installed regardless of your plan to enable the mitigations.
  • Originally released: May 9, 2023
  • Last updated: July 10, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2024-21302

  • Title: Windows Secure Kernel Mode Elevation of Privilege Vulnerability
  • Version: 4.0
  • Reason for revision: Microsoft has released July 8, 2025 security updates for Windows 10 1507, Windows 10, version 1607, Windows 10, version 1809, and Windows Server 2016 and Windows Server 2018 that provide mitigations to protect these versions of Windows from this vulnerability. This ensures that mitigations are available to protect all supported versions of Windows 10 and Windows 11 from this vulnerability. See the available mitigations and deployment guidelines described in [KB5042562: Guidance for blocking rollback of virtualization-based security related updates](https://support.microsoft.com/help/5042562).
  • Originally released: August 7, 2024
  • Last updated: July 10, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes
 

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 12, 2025

CVEs have been published or revised in the Security Update Guide

July 11, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2025-49717

  • Title: Microsoft SQL Server Remote Code Execution Vulnerability
  • Version: 1.2
  • Reason for revision: Updated the severity of the products in the Security Updates table. This is an informational change only.
  • Originally released: July 8, 2025
  • Last updated: July 11, 2025
  • Aggregate CVE severity rating: Important

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 15, 2025

CVEs have been published or revised in the Security Update Guide

July 15, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2025-49717

  • Title: Microsoft SQL Server Remote Code Execution Vulnerability
  • Version: 1.2
  • Reason for revision: Updated the severity of the products in the Security Updates table. This is an informational change only.
  • Originally released: July 8, 2025
  • Last updated: July 11, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2025-49735

  • Title: Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability
  • Version: 1.1
  • Reason for revision: Information published. This CVE was addressed by updates that were released in June 2025, but the CVE was inadvertently omitted from the June 2025 Security Updates. This is an informational change only. Customers who have already installed the June 2025 updates do not need to take any further action.
  • Originally released: July 8, 2025
  • Last updated: July 14, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: Yes
 

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 16, 2025

CVEs have been published or revised in the Security Update Guide

July 16, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2024-29187

  • Title: GitHub: CVE-2024-29187 WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM
  • Version: 6.0
  • Reason for revision: In the Security Updates table, added Windows HLK, Version 1607 because this developer kits is also affected by this vulnerability. Microsoft strongly recommends that customers using Windows HLK, Version 1607 install the update to be fully protected from the vulnerability. See the FAQs section of this vulnerability for more information.
  • Originally released: June 11, 2024
  • Last updated: July 15, 2025
  • Aggregate CVE severity rating: Important

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 16, 2025

CVEs have been published or revised in the Security Update Guide

July 16, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2024-36350

  • Title: AMD: CVE-2024-36350 Transient Scheduler Attack in Store Queue
  • Version: 1.1
  • Reason for revision: Corrected CVE number. This is an informational change only.
  • Originally released: July 8, 2025
  • Last updated: July 16, 2025
  • Aggregate CVE severity rating: Important

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 18, 2025

CVEs have been published or revised in the Security Update Guide

July 18, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2025-47158

  • Title: Azure DevOps Server Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-47995

  • Title: Azure Machine Learning Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-49735

  • Title: Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability
  • Version: 1.3
  • Reason for revision: Corrected Download and Article links in the Security Updates table. This is an informational change only.
  • Originally released: July 8, 2025
  • Last updated: July 17, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: Yes

CVE-2025-49746

  • Title: Azure Machine Learning Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-49747

  • Title: Azure Machine Learning Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-53762

  • Title: Microsoft Purview Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No
 

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 21, 2025

CVEs have been published or revised in the Security Update Guide

July 20, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2025-53770

  • Title: Microsoft SharePoint Server Remote Code Execution Vulnerability
  • Version: 2.0
  • Reason for revision: The security update is avaialble for Microsoft SharePoint Server Subscription Edition. Microsoft strongly encourages customers running this version of SharePoint to install this update as soon as possible.
  • Originally released: July 19, 2025
  • Last updated: July 20, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: Yes

CVE-2025-53771

  • Title: Microsoft SharePoint Server Spoofing Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 20, 2025
  • Last updated: July 20, 2025
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes
 

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 21, 2025

CVEs have been published or revised in the Security Update Guide

July 21, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2025-53770

  • Title: Microsoft SharePoint Server Remote Code Execution Vulnerability
  • Version: 3.0
  • Reason for revision: The security update is avaialble for Microsoft SharePoint Server 2019. Microsoft strongly encourages customers running this version of SharePoint to install this update as soon as possible.
  • Originally released: July 19, 2025
  • Last updated: July 20, 2025
  • Aggregate CVE severity rating: Critical

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 21, 2025

CVEs have been published or revised in the Security Update Guide
July 20, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2025-47158

  • Title: Azure DevOps Server Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-47995

  • Title: Azure Machine Learning Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-49735

  • Title: Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability
  • Version: 1.3
  • Reason for revision: Corrected Download and Article links in the Security Updates table. This is an informational change only.
  • Originally released: July 8, 2025
  • Last updated: July 17, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: Yes

CVE-2025-49746

  • Title: Azure Machine Learning Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-49747

  • Title: Azure Machine Learning Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-53762

  • Title: Microsoft Purview Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 18, 2025
  • Last updated: July 18, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2025-53770

  • Title: Microsoft SharePoint Server Remote Code Execution Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: July 19, 2025
  • Last updated: July 19, 2025
  • Aggregate CVE severity rating: Critical
  • Customer action required: Yes

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 22, 2025

CVEs have been published or revised in the Security Update Guide

July 22, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2022-41089

  • Title: .NET Framework Remote Code Execution Vulnerability
  • Version: 3.0
  • Reason for revision: To address a known issue when after installing the December 13, 2022, updates for .NET Framework and .NET, users may have experienced issues with how WPF-based applications render XPS documents, Microsoft has released the June 2023 security updates for .NET Framework and for .NET. We recommend that customers install the June 2023 updates. Please note that if you used any workaround or mitigations for this issue, they are no longer needed, and we recommend you remove them. To remove either of the workarounds see the instructions for removal in the "Alternative Workaround" section of [KB5022083 Change in how WPF-based applications render XPS documents](https://support.microsoft.com/en-us/topic/kb5022083-change-in-how-wpf-based-applications-render-xps-documents-a4ae4fa4-bc58-4c37-acdd-5eebc4e34556).
  • Originally released: December 13, 2022
  • Last updated: June 30, 2023
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2022-47211

  • Title: Microsoft Office Graphics Remote Code Execution Vulnerability
  • Version: 1.2
  • Reason for revision: Added FAQ information. This is an informational change only.
  • Originally released: December 13, 2022
  • Last updated: March 23, 2023
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes
 

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • July 26, 2025

CVEs have been published or revised in the Security Update Guide

July 25, 2025

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2024-36357

  • Title: AMD: CVE-2025-36357 Transient Scheduler Attack in L1 Data Queue
  • Version: 1.1
  • Reason for revision: Corrected CVE number. This is an informational change only.
  • Originally released: July 8, 2025
  • Last updated: July 23, 2025
  • Aggregate CVE severity rating: Important

Customer action required: Yes