{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2025-032.pdf"
    },
    "title": "Multiple Vulnerabilities in Microsoft Products",
    "serial_number": "2025-032",
    "publish_date": "18-08-2025 09:18:24",
    "description": "On August 13, 2025, Microsoft released its August 2025 Patch Tuesday advisory addressing 111 security flows in various products among which 16 are rated as critical.<br>\nIt is recommended updating as soon as possible, prioritising public facing and critical assets.<br>\n",
    "url_title": "2025-032",
    "content_markdown": "---    \ntitle: 'Multiple Vulnerabilities in\u00a0Microsoft\u00a0Products'\nnumber: '2025-032'\nversion: '1.0'\noriginal_date: '2025-08-13'\ndate: '2025-08-18'\n---\n\n_History:_\n\n* _18/08/2025 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn August 13, 2025, Microsoft released its August 2025 Patch Tuesday advisory addressing 111 security flows in various products among which 16 are rated as critical [1].\n\nIt is recommended updating as soon as possible, prioritising public facing and critical assets.\n\n# Technical Details\n\nBelow are listed the notable vulnerabilities among those rated as critical by Microsoft:\n\nThe vulnerability **CVE-2025-50176**, with a CVSS score of 7.8, is due to a type confusion flaw in the DirectX Graphics Kernel allowing an authenticated attacker to execute code locally [2].\n\nThe vulnerability **CVE-2025-50165**, with a CVSS score of 9.8, is due to the use of untrusted pointer dereference in Microsoft Graphics Component allowing an authenticated attacker to execute code over a network without user interaction [3].\n\nThe vulnerabilities **CVE-2025-53740** and **CVE-2025-53731**, with a CVSS score of 8.4, are use after free security flaws in Microsoft Office, and allow a remote attacker to execute code locally. Microsoft confirmed that the Preview Pane is also an attack vector [4,5].\n\nThe vulnerabilities **CVE-2025-53784** and **CVE-2025-53733**, with a CVSS score of 8.4, are use after free security flaws in Microsoft Word, and allow a remote attacker to execute code locally. Microsoft confirmed that the Preview Pane is also an attack vector [6,7].\n\nThe vulnerability **CVE-2025-48807**, with a CVSS score of 7.5, is due to improper restriction of communication channel to intended endpoints in Windows Hyper-V allowing an authenticated attacker to execute code locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability. This vulnerability also requires an interaction from an administrator [8].\n\nThe vulnerability **CVE-2025-53766**, with a CVSS score of 9.8, is a heap-based buffer overflow flaw in Windows GDI+ an unauthenticated attacker to execute code over a network. An attacker doesn't require any privileges on the systems hosting the web services. Successful exploitation of this vulnerability could cause Remote Code Execution or Information Disclosure on web services that are parsing documents that contain a specially crafted metafile, without the involvement of a victim user. An attacker could trigger this vulnerability by convincing a victim to download and open a document that contains a specially crafted metafile. In the worst-case scenario, an attacker could trigger this vulnerability on web services by uploading documents containing a specially crafted metafile without user interaction [9].\n\nThe vulnerability **CVE-2025-50177**, with a CVSS score of 8.1, is a use after free vulnerability in Windows Message Queuing allowing an unauthenticated attacker to execute code over a network. To exploit this vulnerability, an attacker would need to send a series of specially crafted MSMQ packets in a rapid sequence over HTTP to a MSMQ server. This could result in remote code execution on the server side [10].\n\nThe vulnerability **CVE-2025-53778**, with a CVSS score of 8.8, is due to improper authentication in Windows NTLM and allows an authenticated attacker to elevate privileges over a network. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges [11].\n \n# Affected Products\n\nMicrosoft Office, Office Word and Microsoft Windows are affected by the vulnerabilities described above.\n\nFor the list of all products affected, refer to Microsoft's advisory [1].\n\n# Recommendations\n\nIt is recommended updating as soon as possible, prioritising public facing and critical assets.\n\n# References\n\n[1] <https://msrc.microsoft.com/update-guide/releaseNote/2025-Aug>\n\n[2] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50176>\n\n[3] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50165>\n\n[4] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53740>\n\n[5] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53731>\n\n[6] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53784>\n\n[7] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53733>\n\n[8] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48807>\n\n[9] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53766>\n\n[10] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50177>\n\n[11] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53778>",
    "content_html": "<p><em>History:</em></p><ul><li><em>18/08/2025 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On August 13, 2025, Microsoft released its August 2025 Patch Tuesday advisory addressing 111 security flows in various products among which 16 are rated as critical [1].</p><p>It is recommended updating as soon as possible, prioritising public facing and critical assets.</p><h2 id=\"technical-details\">Technical Details</h2><p>Below are listed the notable vulnerabilities among those rated as critical by Microsoft:</p><p>The vulnerability <strong>CVE-2025-50176</strong>, with a CVSS score of 7.8, is due to a type confusion flaw in the DirectX Graphics Kernel allowing an authenticated attacker to execute code locally [2].</p><p>The vulnerability <strong>CVE-2025-50165</strong>, with a CVSS score of 9.8, is due to the use of untrusted pointer dereference in Microsoft Graphics Component allowing an authenticated attacker to execute code over a network without user interaction [3].</p><p>The vulnerabilities <strong>CVE-2025-53740</strong> and <strong>CVE-2025-53731</strong>, with a CVSS score of 8.4, are use after free security flaws in Microsoft Office, and allow a remote attacker to execute code locally. Microsoft confirmed that the Preview Pane is also an attack vector [4,5].</p><p>The vulnerabilities <strong>CVE-2025-53784</strong> and <strong>CVE-2025-53733</strong>, with a CVSS score of 8.4, are use after free security flaws in Microsoft Word, and allow a remote attacker to execute code locally. Microsoft confirmed that the Preview Pane is also an attack vector [6,7].</p><p>The vulnerability <strong>CVE-2025-48807</strong>, with a CVSS score of 7.5, is due to improper restriction of communication channel to intended endpoints in Windows Hyper-V allowing an authenticated attacker to execute code locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability. This vulnerability also requires an interaction from an administrator [8].</p><p>The vulnerability <strong>CVE-2025-53766</strong>, with a CVSS score of 9.8, is a heap-based buffer overflow flaw in Windows GDI+ an unauthenticated attacker to execute code over a network. An attacker doesn't require any privileges on the systems hosting the web services. Successful exploitation of this vulnerability could cause Remote Code Execution or Information Disclosure on web services that are parsing documents that contain a specially crafted metafile, without the involvement of a victim user. An attacker could trigger this vulnerability by convincing a victim to download and open a document that contains a specially crafted metafile. In the worst-case scenario, an attacker could trigger this vulnerability on web services by uploading documents containing a specially crafted metafile without user interaction [9].</p><p>The vulnerability <strong>CVE-2025-50177</strong>, with a CVSS score of 8.1, is a use after free vulnerability in Windows Message Queuing allowing an unauthenticated attacker to execute code over a network. To exploit this vulnerability, an attacker would need to send a series of specially crafted MSMQ packets in a rapid sequence over HTTP to a MSMQ server. This could result in remote code execution on the server side [10].</p><p>The vulnerability <strong>CVE-2025-53778</strong>, with a CVSS score of 8.8, is due to improper authentication in Windows NTLM and allows an authenticated attacker to elevate privileges over a network. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges [11].</p><h2 id=\"affected-products\">Affected Products</h2><p>Microsoft Office, Office Word and Microsoft Windows are affected by the vulnerabilities described above.</p><p>For the list of all products affected, refer to Microsoft's advisory [1].</p><h2 id=\"recommendations\">Recommendations</h2><p>It is recommended updating as soon as possible, prioritising public facing and critical assets.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/releaseNote/2025-Aug\">https://msrc.microsoft.com/update-guide/releaseNote/2025-Aug</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50176\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50176</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50165\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50165</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53740\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53740</a></p><p>[5] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53731\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53731</a></p><p>[6] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53784\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53784</a></p><p>[7] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53733\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53733</a></p><p>[8] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48807\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48807</a></p><p>[9] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53766\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53766</a></p><p>[10] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50177\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50177</a></p><p>[11] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53778\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53778</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}