通告编号:NS-2025-0022
TAG: |
安全更新、Windows、Microsoft Office、Azure、Microsoft Edge for iOS、Microsoft Visual Studio |
漏洞危害: |
攻击者利用本次安全更新中的漏洞,可造成权限提升、远程代码执行等 |
版本: | 1.0 |
漏洞概述
4月9日,绿盟科技CERT监测到微软发布4月安全更新补丁,修复了126个安全问题,涉及Windows、Microsoft Office、Azure、Microsoft Edge for iOS、Microsoft Visual Studio等广泛使用的产品,其中包括权限提升、远程代码执行等高危漏洞类型。
本月微软月度更新修复的漏洞中,严重程度为关键(Critical)的漏洞有11个,重要(Important)漏洞有112个。其中包括1个已检测到在野利用的漏洞:
Windows通用日志文件系统驱动程序权限提升漏洞(CVE-2025-29824)
请相关用户尽快更新补丁进行防护,完整漏洞列表请参考附录。
参考链接:
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-Apr
SEE MORE →
2重点漏洞简述
根据产品流行度和漏洞重要性筛选出此次更新中包含影响较大的漏洞,请相关用户重点进行关注:
Windows通用日志文件系统驱动程序权限提升漏洞(CVE-2025-29824):
Windows通用日志文件系统驱动程序中存在权限提升漏洞。由于Windows Common Log File System驱动程序中存在释放后重用错误,经过身份验证的本地攻击者可以通过该漏洞获取SYSTEM权限。该漏洞已存在在野利用,CVSS评分7.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824
Microsoft SharePoint远程代码执行漏洞(CVE-2025-29794):
Microsoft SharePoint存在远程代码执行漏洞。由于Microsoft Office SharePoint中的不当授权,经过身份验证的远程攻击者可以通过该漏洞执行任意代码。CVSS评分8.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29794
Windows远程桌面服务远程代码执行漏洞(CVE-2025-27480、CVE-2025-27482):
Windows远程桌面服务存在远程代码执行漏洞。由于Windows远程桌面服务中存在释放后重用和内存锁定不当漏洞,未经身份验证的攻击者可以通过连接到具有远程桌面网关角色的系统,触发争用条件以创建释放后使用场景,从而在系统上执行任意代码。CVSS评分8.1。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27480
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27482
Windows轻量级目录访问协议 (LDAP) 客户端远程代码执行漏洞(CVE-2025-26670、CVE-2025-26663):
Windows轻量级目录访问协议 (LDAP) 客户端存在远程代码执行漏洞。由于轻量级目录访问协议(LDAP)客户端存在释放后重用错误,未经身份验证的攻击者可以按顺序向易受攻击的 LDAP 服务器发送特制请求,从而实现远程代码执行。CVSS评分8.1。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26670
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26663
Windows远程桌面服务远程代码执行漏洞(CVE-2025-27752):
Windows远程桌面服务存在远程代码执行漏洞。由于Microsoft Office Excel中存在基于堆的缓冲区溢出,未经身份验证的远程攻击者可以在本地执行代码。CVSS评分7.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27752
Windows Kerberos特权提升漏洞(CVE-2025-26647):
Windows Kerberos存在特权提升漏洞。由于Windows Kerberos中不正确的输入验证,未经身份验证的攻击者可以通过入侵受信任的证书颁发机构(CA)并签发具有特定SKI值的证书来冒充其他账户身份,从而实现权限提升。CVSS评分8.1。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26647
Windows路由和远程访问服务(RRAS)信息泄漏漏洞(CVE-2025-26669):
Windows路由和远程访问服务(RRAS)存在信息泄漏漏洞。由于Windows 路由和远程访问服务(RRAS)中存在越界读取,未经身份验证的攻击者通过诱骗用户向恶意服务器发送请求来利用此漏洞,从而在目标系统上执行任意代码。CVSS评分8.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26669
3影响范围
以下为部分重点关注漏洞的受影响产品版本,其他漏洞影响产品范围请参阅官方通告链接。
漏洞编号 |
受影响产品版本 |
CVE-2025-26663 CVE-2025-26670 CVE-2025-29824 CVE-2025-26669 |
Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems |
CVE-2025-27752 |
Microsoft Office LTSC for Mac 2024 Microsoft Office LTSC for Mac 2021 Microsoft Office LTSC 2024 for 64-bit editions Microsoft Office LTSC 2024 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for 32-bit editions Microsoft Office 2016 (64-bit edition) Microsoft Office 2016 (32-bit edition) Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft 365 Apps for Enterprise for 32-bit Systems |
CVE-2025-27480 |
Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 |
CVE-2025-27482 |
Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 |
CVE-2025-29794 |
Microsoft SharePoint Server Subscription Edition Microsoft SharePoint Server 2019 Microsoft SharePoint Enterprise Server 2016 |
CVE-2025-26647 |
Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 |
4漏洞防护
4.1 补丁更新
目前微软官方已针对受支持的产品版本发布了修复以上漏洞的安全补丁,强烈建议受影响用户尽快安装补丁进行防护,官方下载链接:
https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr
注:由于网络问题、计算机环境问题等原因,Windows Update的补丁更新可能出现失败。用户在安装补丁后,应及时检查补丁是否成功更新。
右键点击Windows图标,选择“设置(N)”,选择“更新和安全”-“Windows更新”,查看该页面上的提示信息,也可点击“查看更新历史记录”查看历史更新情况。
针对未成功安装的更新,可点击更新名称跳转到微软官方下载页面,建议用户点击该页面上的链接,转到“Microsoft更新目录”网站下载独立程序包并安装。
附录:漏洞列表
影响产品 |
CVE编号 |
漏洞标题 |
严重程度 |
Windows |
CVE-2025-26663 |
Windows Lightweight Directory Access Protocol (LDAP) 远程代码执行漏洞 |
Critical |
Windows |
CVE-2025-26686 |
Windows TCP/IP 远程代码执行漏洞 |
Critical |
Microsoft Office |
CVE-2025-27745 |
Microsoft Office 远程代码执行漏洞 |
Critical |
Microsoft Office |
CVE-2025-27748 |
Microsoft Office 远程代码执行漏洞 |
Critical |
Microsoft Office |
CVE-2025-27749 |
Microsoft Office 远程代码执行漏洞 |
Critical |
Microsoft Office |
CVE-2025-27752 |
Microsoft Excel 远程代码执行漏洞 |
Critical |
Microsoft Office |
CVE-2025-29791 |
Microsoft Excel 远程代码执行漏洞 |
Critical |
Windows |
CVE-2025-26670 |
Lightweight Directory Access Protocol (LDAP) Client 远程代码执行漏洞 |
Critical |
Windows |
CVE-2025-27480 |
Windows Remote Desktop Services 远程代码执行漏洞 |
Critical |
Windows |
CVE-2025-27482 |
Windows Remote Desktop Services 远程代码执行漏洞 |
Critical |
Windows |
CVE-2025-27491 |
Windows Hyper-V 远程代码执行漏洞 |
Critical |
Windows |
CVE-2025-26664 |
Windows Routing and Remote Access Service (RRAS) 信息披露漏洞 |
Important |
Windows |
CVE-2025-26665 |
Windows upnphost.dll 权限提升漏洞 |
Important |
Windows |
CVE-2025-26666 |
Windows Media 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-26669 |
Windows Routing and Remote Access Service (RRAS) 信息披露漏洞 |
Important |
Windows |
CVE-2025-26667 |
Windows Routing and Remote Access Service (RRAS) 信息披露漏洞 |
Important |
Windows |
CVE-2025-26668 |
Windows Routing and Remote Access Service (RRAS) 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-26681 |
Win32k 权限提升漏洞 |
Important |
Windows |
CVE-2025-26680 |
Windows Standards-Based Storage Management Service 拒绝服务漏洞 |
Important |
Microsoft Office,Windows |
CVE-2025-26687 |
Win32k 权限提升漏洞 |
Important |
Windows |
CVE-2025-26688 |
Microsoft Virtual Hard Disk 权限提升漏洞 |
Important |
Windows |
CVE-2025-27471 |
Microsoft Streaming Service 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-27470 |
Windows Standards-Based Storage Management Service 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-27473 |
HTTP.sys 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-27472 |
Windows Mark of the Web 安全功能绕过漏洞 |
Important |
Windows |
CVE-2025-27474 |
Windows Routing and Remote Access Service (RRAS) 信息披露漏洞 |
Important |
Windows |
CVE-2025-27476 |
Windows Digital Media 权限提升漏洞 |
Important |
Windows |
CVE-2025-27475 |
Windows Update Stack 权限提升漏洞 |
Important |
Windows |
CVE-2025-27477 |
Windows Telephony Service 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-27478 |
Windows Local Security Authority (LSA) 权限提升漏洞 |
Important |
Windows |
CVE-2025-27479 |
Kerberos Key Distribution Proxy Service 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-27740 |
Active Directory Certificate Services 权限提升漏洞 |
Important |
Windows |
CVE-2025-27741 |
NTFS 权限提升漏洞 |
Important |
Microsoft Office |
CVE-2025-27744 |
Microsoft Office 权限提升漏洞 |
Important |
Windows |
CVE-2025-27742 |
NTFS 信息披露漏洞 |
Important |
Microsoft Office |
CVE-2025-27746 |
Microsoft Office 远程代码执行漏洞 |
Important |
Microsoft Office |
CVE-2025-27747 |
Microsoft Word 远程代码执行漏洞 |
Important |
System Center |
CVE-2025-27743 |
Microsoft System Center 权限提升漏洞 |
Important |
Microsoft Office |
CVE-2025-27751 |
Microsoft Excel 远程代码执行漏洞 |
Important |
Microsoft Office |
CVE-2025-27750 |
Microsoft Excel 远程代码执行漏洞 |
Important |
Microsoft Office |
CVE-2025-29793 |
Microsoft SharePoint 远程代码执行漏洞 |
Important |
Microsoft Office |
CVE-2025-29792 |
Microsoft Office 权限提升漏洞 |
Important |
Microsoft Office |
CVE-2025-29794 |
Microsoft SharePoint 远程代码执行漏洞 |
Important |
Microsoft Dynamics |
CVE-2025-29821 |
Microsoft Dynamics Business Central 信息披露漏洞 |
Important |
Microsoft Office |
CVE-2025-29820 |
Microsoft Word 远程代码执行漏洞 |
Important |
Microsoft Office |
CVE-2025-29822 |
Microsoft OneNote 安全功能绕过漏洞 |
Important |
Microsoft Office |
CVE-2025-29823 |
Microsoft Excel 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-29824 |
Windows Common Log File System Driver 权限提升漏洞 |
Important |
Windows |
CVE-2025-24074 |
Microsoft DWM Core Library 权限提升漏洞 |
Important |
Windows |
CVE-2025-24073 |
Microsoft DWM Core Library 权限提升漏洞 |
Important |
Windows |
CVE-2025-21174 |
Windows Standards-Based Storage Management Service 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-21197 |
Windows NTFS 信息披露漏洞 |
Important |
Windows |
CVE-2025-21191 |
Windows Local Security Authority (LSA) 权限提升漏洞 |
Important |
Windows |
CVE-2025-21205 |
Windows Telephony Service 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-21203 |
Windows Routing and Remote Access Service (RRAS) 信息披露漏洞 |
Important |
Windows |
CVE-2025-21204 |
Windows Process Activation 权限提升漏洞 |
Important |
Windows |
CVE-2025-21221 |
Windows Telephony Service 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-21222 |
Windows Telephony Service 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-24058 |
Windows DWM Core Library 权限提升漏洞 |
Important |
Microsoft Edge (Chromium-based) |
CVE-2025-25000 |
Microsoft Edge (Chromium-based) 远程代码执行漏洞 |
Important |
Azure |
CVE-2025-25002 |
Azure Local Cluster 信息披露漏洞 |
Important |
Azure |
CVE-2025-26628 |
Azure Local Cluster 信息披露漏洞 |
Important |
Windows |
CVE-2025-26639 |
Windows USB Print Driver 权限提升漏洞 |
Important |
Windows |
CVE-2025-26635 |
Windows Hello 安全功能绕过漏洞 |
Important |
Windows |
CVE-2025-26637 |
BitLocker 安全功能绕过漏洞 |
Important |
Microsoft Office |
CVE-2025-26642 |
Microsoft Office 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-26640 |
Windows Digital Media 权限提升漏洞 |
Important |
Windows |
CVE-2025-26641 |
Microsoft Message Queuing (MSMQ) 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-26644 |
Windows Hello 欺骗漏洞 |
Important |
Windows |
CVE-2025-26648 |
Windows Kernel 权限提升漏洞 |
Important |
Windows |
CVE-2025-26649 |
Windows Secure Channel 权限提升漏洞 |
Important |
Windows |
CVE-2025-26647 |
Windows Kerberos 权限提升漏洞 |
Important |
Windows |
CVE-2025-26651 |
Windows Local Session Manager (LSM) 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-26652 |
Windows Standards-Based Storage Management Service 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-26671 |
Windows Remote Desktop Services 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-26674 |
Windows Media 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-26672 |
Windows Routing and Remote Access Service (RRAS) 信息披露漏洞 |
Important |
Windows |
CVE-2025-26673 |
Windows Lightweight Directory Access Protocol (LDAP) 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-26675 |
Windows Subsystem for Linux 权限提升漏洞 |
Important |
Windows |
CVE-2025-26676 |
Windows Routing and Remote Access Service (RRAS) 信息披露漏洞 |
Important |
Windows |
CVE-2025-26678 |
Windows Defender Application Control 安全功能绕过漏洞 |
Important |
Windows |
CVE-2025-26679 |
RPC Endpoint Mapper Service 权限提升漏洞 |
Important |
Windows |
CVE-2025-27467 |
Windows Digital Media 权限提升漏洞 |
Important |
Windows |
CVE-2025-27469 |
Windows Lightweight Directory Access Protocol (LDAP) 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-27485 |
Windows Standards-Based Storage Management Service 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-27484 |
Windows Universal Plug and Play (UPnP) Device Host 权限提升漏洞 |
Important |
Windows |
CVE-2025-27481 |
Windows Telephony Service 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-27483 |
NTFS 权限提升漏洞 |
Important |
Windows |
CVE-2025-27487 |
Remote Desktop Client 远程代码执行漏洞 |
Important |
Azure |
CVE-2025-27489 |
Azure Local 权限提升漏洞 |
Important |
Windows |
CVE-2025-27486 |
Windows Standards-Based Storage Management Service 拒绝服务漏洞 |
Important |
Windows |
CVE-2025-27492 |
Windows Secure Channel 权限提升漏洞 |
Important |
Windows |
CVE-2025-27490 |
Windows Bluetooth Service 权限提升漏洞 |
Important |
Windows |
CVE-2025-27727 |
Windows Installer 权限提升漏洞 |
Important |
Windows |
CVE-2025-27729 |
Windows Shell 远程代码执行漏洞 |
Important |
Windows |
CVE-2025-27728 |
Windows Kernel-Mode Driver 权限提升漏洞 |
Important |
Windows |
CVE-2025-27731 |
Microsoft OpenSSH for Windows 权限提升漏洞 |
Important |
Windows |
CVE-2025-27730 |
Windows Digital Media 权限提升漏洞 |
Important |
Windows |
CVE-2025-27732 |
Windows Graphics Component 权限提升漏洞 |
Important |
Windows |
CVE-2025-27733 |
NTFS 权限提升漏洞 |
Important |
Windows |
CVE-2025-27735 |
Windows Virtualization-Based Security (VBS) 安全功能绕过漏洞 |
Important |
Windows |
CVE-2025-27736 |
Windows Power Dependency Coordinator 信息披露漏洞 |
Important |
Windows |
CVE-2025-27737 |
Windows Security Zone Mapping 安全功能绕过漏洞 |
Important |
Windows |
CVE-2025-27738 |
Windows Resilient File System (ReFS) 信息披露漏洞 |
Important |
Windows |
CVE-2025-27739 |
Windows Kernel 权限提升漏洞 |
Important |
Visual Studio Tools for Applications (VSTA),SQL Server Management Studio,VSTA |
CVE-2025-29803 |
Visual Studio Tools for Applications and SQL Server Management Studio 权限提升漏洞 |
Important |
Microsoft Office |
CVE-2025-29800 |
Microsoft AutoUpdate (MAU) 权限提升漏洞 |
Important |
Microsoft Visual Studio |
CVE-2025-29802 |
Visual Studio 权限提升漏洞 |
Important |
Microsoft Office |
CVE-2025-29801 |
Microsoft AutoUpdate (MAU) 权限提升漏洞 |
Important |
Microsoft Visual Studio |
CVE-2025-29804 |
Visual Studio 权限提升漏洞 |
Important |
Windows |
CVE-2025-29809 |
Windows Kerberos 安全功能绕过漏洞 |
Important |
Windows |
CVE-2025-29808 |
Windows Cryptographic Services 信息披露漏洞 |
Important |
Apps |
CVE-2025-29805 |
Outlook for Android 信息披露漏洞 |
Important |
Windows |
CVE-2025-29810 |
Active Directory Domain Services 权限提升漏洞 |
Important |
Windows |
CVE-2025-29812 |
DirectX Graphics Kernel 权限提升漏洞 |
Important |
Microsoft Office |
CVE-2025-29816 |
Microsoft Word 安全功能绕过漏洞 |
Important |
Microsoft Edge (Chromium-based) |
CVE-2025-29815 |
Microsoft Edge (Chromium-based) 远程代码执行漏洞 |
Important |
Azure,Windows |
CVE-2025-29819 |
Windows Admin Center in Azure Portal 信息披露漏洞 |
Important |
Windows |
CVE-2025-29811 |
Windows Mobile Broadband Driver 权限提升漏洞 |
Important |
Visual Studio Code |
CVE-2025-20570 |
Visual Studio Code 权限提升漏洞 |
Important |
Windows |
CVE-2025-24060 |
Microsoft DWM Core Library 权限提升漏洞 |
Important |
Windows |
CVE-2025-24062 |
Microsoft DWM Core Library 权限提升漏洞 |
Important |
ASP.NET Core,Microsoft Visual Studio |
CVE-2025-26682 |
ASP.NET Core and Visual Studio 拒绝服务漏洞 |
Important |
Microsoft Edge for iOS |
CVE-2025-29796 |
Microsoft Edge for iOS 欺骗漏洞 |
Low |
Microsoft Edge for iOS |
CVE-2025-25001 |
Microsoft Edge for iOS 欺骗漏洞 |
Low |
END
本安全公告仅用来描述可能存在的安全问题,绿盟科技不为此安全公告提供任何保证或承诺。由于传播、利用此安全公告所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,绿盟科技以及安全公告作者不为此承担任何责任。
绿盟科技拥有对此安全公告的修改和解释权。如欲转载或传播此安全公告,必须保证此安全公告的完整性,包括版权声明等全部内容。未经绿盟科技允许,不得任意修改或者增减此安全公告内容,不得以任何方式将其用于商业目的。
原文始发于微信公众号(绿盟科技CERT):【安全更新】微软4月安全更新多个产品高危漏洞通告
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论