Search criteria
672 vulnerabilities found for N/A by Microsoft
CERTFR-2025-AVI-0799
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits Microsoft. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft PC Manager versions ant\u00e9rieures \u00e0 3.18.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49728"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0799",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Microsoft. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-09-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49728",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49728"
}
]
}
CERTFR-2025-AVI-0783
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 140.0.3485.66",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-10201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10201"
},
{
"name": "CVE-2025-10200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10200"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0783",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2025-09-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-10201",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10201"
},
{
"published_at": "2025-09-11",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-10200",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10200"
}
]
}
CERTFR-2025-AVI-0780
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (CU 20) versions antérieures à 16.0.4212.1 | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20047 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (CU 31) versions antérieures à 14.0.3505.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 (GDR) versions antérieures à 13.0.6470.1 | ||
| Microsoft | N/A | Microsoft HPC Pack 2019 versions antérieures à 6.3.8352 Quick Fix QFE | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.19127.20100 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (GDR) versions antérieures à 15.0.2145.1 | ||
| Microsoft | N/A | Xbox Gaming Services versions antérieures à 30.104.13001.0. | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (GDR) versions antérieures à 16.0.1150.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (GDR) versions antérieures à 14.0.2085.1 | ||
| Microsoft | N/A | Microsoft AutoUpdate pour Mac versions antérieures à 4.80 | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5517.1000 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (CU 32) versions antérieures à 15.0.4445.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 Azure Connect Feature Pack versions antérieures à 13.0.7065.1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 20) versions ant\u00e9rieures \u00e0 16.0.4212.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20047",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (CU 31) versions ant\u00e9rieures \u00e0 14.0.3505.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 (GDR) versions ant\u00e9rieures \u00e0 13.0.6470.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft HPC Pack 2019 versions ant\u00e9rieures \u00e0 6.3.8352 Quick Fix QFE",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.19127.20100",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 15.0.2145.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Xbox Gaming Services versions ant\u00e9rieures \u00e0 30.104.13001.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 16.0.1150.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 14.0.2085.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft AutoUpdate pour Mac versions ant\u00e9rieures \u00e0 4.80",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 32) versions ant\u00e9rieures \u00e0 15.0.4445.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 Azure Connect Feature Pack versions ant\u00e9rieures \u00e0 13.0.7065.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-54897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54897"
},
{
"name": "CVE-2025-47997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47997"
},
{
"name": "CVE-2025-55317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55317"
},
{
"name": "CVE-2024-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21907"
},
{
"name": "CVE-2025-55227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55227"
},
{
"name": "CVE-2025-55232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55232"
},
{
"name": "CVE-2025-54905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54905"
},
{
"name": "CVE-2025-55245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55245"
},
{
"name": "CVE-2025-54906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54906"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0780",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54897",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54897"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47997",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47997"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55227",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55227"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21907",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47997",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47997"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54906",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54906"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54905",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54905"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2024-21907",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55317",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55317"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55245",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55245"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55232",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55232"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-55227",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55227"
}
]
}
CERTFR-2025-AVI-0778
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23529 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23529 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7792 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22774 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6332 | ||
| Microsoft | N/A | Windows Server 2025 versions antérieures à 10.0.26100.6508 | ||
| Microsoft | N/A | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21128 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27929 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25675 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7792 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6332 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5909 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.25675 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23529 | ||
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.4106 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5909 | ||
| Microsoft | N/A | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6508 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6332 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6332 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7792 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21128 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.22774 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6332 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6508 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8422 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8422 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.17763.7792 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1849 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.8422 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27929 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5909 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4106 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8422 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6508 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6332 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.000 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5909 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23529 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23529",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23529",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7792",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22774",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6332",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21128",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27929",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25675",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7792",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6332",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25675",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23529",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4106",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5909",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6508",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6332",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6332",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7792",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21128",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22774",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6332",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8422",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8422",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7792",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1849",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8422",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27929",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5909",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4106",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8422",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6332",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23529",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-54911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54911"
},
{
"name": "CVE-2025-54098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54098"
},
{
"name": "CVE-2025-55226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55226"
},
{
"name": "CVE-2025-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54091"
},
{
"name": "CVE-2025-54102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54102"
},
{
"name": "CVE-2025-55234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55234"
},
{
"name": "CVE-2025-54915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54915"
},
{
"name": "CVE-2025-49734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49734"
},
{
"name": "CVE-2025-55224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55224"
},
{
"name": "CVE-2025-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53806"
},
{
"name": "CVE-2025-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54105"
},
{
"name": "CVE-2025-54111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54111"
},
{
"name": "CVE-2025-54108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54108"
},
{
"name": "CVE-2025-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54107"
},
{
"name": "CVE-2025-53796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53796"
},
{
"name": "CVE-2025-54097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54097"
},
{
"name": "CVE-2025-54894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54894"
},
{
"name": "CVE-2025-53810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53810"
},
{
"name": "CVE-2025-55223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55223"
},
{
"name": "CVE-2025-54917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54917"
},
{
"name": "CVE-2025-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54101"
},
{
"name": "CVE-2025-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54106"
},
{
"name": "CVE-2025-55236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55236"
},
{
"name": "CVE-2025-55228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55228"
},
{
"name": "CVE-2025-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54094"
},
{
"name": "CVE-2025-53798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53798"
},
{
"name": "CVE-2025-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53799"
},
{
"name": "CVE-2025-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54099"
},
{
"name": "CVE-2025-54114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54114"
},
{
"name": "CVE-2025-54912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54912"
},
{
"name": "CVE-2025-54919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54919"
},
{
"name": "CVE-2025-54116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54116"
},
{
"name": "CVE-2025-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54093"
},
{
"name": "CVE-2025-55225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55225"
},
{
"name": "CVE-2025-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54095"
},
{
"name": "CVE-2025-54109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54109"
},
{
"name": "CVE-2025-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54104"
},
{
"name": "CVE-2025-54913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54913"
},
{
"name": "CVE-2025-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54096"
},
{
"name": "CVE-2025-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54092"
},
{
"name": "CVE-2025-53803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53803"
},
{
"name": "CVE-2025-54103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54103"
},
{
"name": "CVE-2025-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54113"
},
{
"name": "CVE-2025-53801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53801"
},
{
"name": "CVE-2025-54895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54895"
},
{
"name": "CVE-2025-54918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54918"
},
{
"name": "CVE-2025-53800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53800"
},
{
"name": "CVE-2025-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53808"
},
{
"name": "CVE-2025-53809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53809"
},
{
"name": "CVE-2025-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54115"
},
{
"name": "CVE-2025-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54112"
},
{
"name": "CVE-2025-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53802"
},
{
"name": "CVE-2025-54916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54916"
},
{
"name": "CVE-2025-53805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53805"
},
{
"name": "CVE-2025-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53797"
},
{
"name": "CVE-2025-53804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53804"
},
{
"name": "CVE-2025-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53807"
},
{
"name": "CVE-2025-54110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54110"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0778",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53798",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53798"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53801",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53801"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54911",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54911"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53802",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53802"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54919",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54919"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53806",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53806"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54093",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54093"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53803",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53803"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55236",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55236"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54097",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54097"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54913",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54913"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54115",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54115"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55228",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55228"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54915",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54915"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54917",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54917"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54102",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54102"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54098",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54098"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54894",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54894"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54116",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54116"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54114",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54114"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53800",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53800"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54104"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55226",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55226"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53804",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53804"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54095",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54095"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53797",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53797"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54895",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54895"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53799",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53799"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53805",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53805"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54099",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54099"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55224",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55224"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54105",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54105"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54916",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54916"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53796",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53796"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53809",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53809"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54106",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54106"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55223",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55223"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54096",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54096"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54108",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54108"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54091",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54091"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54094",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54094"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54109",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54109"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54101",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54101"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54092",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54092"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54912",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54912"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54110",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54110"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49734",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49734"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53808",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53808"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54112",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54112"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54918",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54918"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54103",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54103"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54111",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54111"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55225",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55225"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54113",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54113"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53810",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53810"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54107",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54107"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53807",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53807"
}
]
}
CERTFR-2025-AVI-0779
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Connected Machine Agent versions ant\u00e9rieures \u00e0 1.56",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Connected Machine Agent versions ant\u00e9rieures \u00e0 1.49",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-49692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49692"
},
{
"name": "CVE-2025-55316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55316"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0779",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-10T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-55316",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55316"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49692",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49692"
}
]
}
CERTFR-2025-AVI-0777
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Office. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Word 2016 (édition 32 bits) versions antérieures à 16.0.5517.1000 | ||
| Microsoft | N/A | Microsoft Word 2016 (édition 64 bits) versions antérieures à 16.0.5517.1000 | ||
| Microsoft | N/A | Microsoft Office pour Android versions antérieures à 16.0.19220.20000 | ||
| Microsoft | N/A | Microsoft Office LTSC 2021 pour éditions 32 bits | ||
| Microsoft | N/A | Microsoft Excel 2016 (édition 64 bits) versions antérieures à 16.0.5517.1000 | ||
| Microsoft | N/A | Microsoft OfficePLUS versions antérieures à 3.10.0.26585 | ||
| Microsoft | N/A | Microsoft Office LTSC 2024 pour éditions 32 bits | ||
| Microsoft | N/A | Microsoft Office 2016 (édition 32 bits) versions antérieures à 16.0.5517.1000 | ||
| Microsoft | N/A | Microsoft Office 2019 pour éditions 32 bits | ||
| Microsoft | N/A | Microsoft Office 2019 pour éditions 64 bits | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 64 bits | ||
| Microsoft | N/A | Office Online Server versions antérieures à 16.0.10417.20047 | ||
| Microsoft | N/A | Microsoft PowerPoint 2016 (édition 32 bits) versions antérieures à 16.0.5517.1000 | ||
| Microsoft | N/A | Microsoft Office LTSC 2024 pour éditions 64 bits | ||
| Microsoft | N/A | Microsoft Office LTSC pour Mac 2024 | ||
| Microsoft | N/A | Microsoft PowerPoint 2016 (édition 64 bits) versions antérieures à 16.0.5517.1000 | ||
| Microsoft | N/A | Microsoft Office 2016 (édition 64 bits) versions antérieures à 16.0.5517.1000 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft Office LTSC 2021 pour éditions 64 bits | ||
| Microsoft | N/A | Microsoft Office LTSC pour Mac 2021 | ||
| Microsoft | N/A | Microsoft Excel 2016 (édition 32 bits) versions antérieures à 16.0.5517.1000 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Word 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Word 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office pour Android versions ant\u00e9rieures \u00e0 16.0.19220.20000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2021 pour \u00e9ditions 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Excel 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft OfficePLUS versions ant\u00e9rieures \u00e0 3.10.0.26585",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2024 pour \u00e9ditions 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2019 pour \u00e9ditions 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2019 pour \u00e9ditions 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Office Online Server versions ant\u00e9rieures \u00e0 16.0.10417.20047",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft PowerPoint 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2024 pour \u00e9ditions 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC pour Mac 2024",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft PowerPoint 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2021 pour \u00e9ditions 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC pour Mac 2021",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Excel 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5517.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-54901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54901"
},
{
"name": "CVE-2025-54908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54908"
},
{
"name": "CVE-2025-55243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55243"
},
{
"name": "CVE-2025-54903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54903"
},
{
"name": "CVE-2025-54899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54899"
},
{
"name": "CVE-2025-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53799"
},
{
"name": "CVE-2025-54898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54898"
},
{
"name": "CVE-2025-54904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54904"
},
{
"name": "CVE-2025-54900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54900"
},
{
"name": "CVE-2025-54905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54905"
},
{
"name": "CVE-2025-54896",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54896"
},
{
"name": "CVE-2025-54906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54906"
},
{
"name": "CVE-2025-54902",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54902"
},
{
"name": "CVE-2025-54907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54907"
},
{
"name": "CVE-2025-54910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54910"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0777",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Office. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Office",
"vendor_advisories": [
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54905",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54905"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54900",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54900"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54901",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54901"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54908",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54908"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54896",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54896"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54910",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54910"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-53799",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53799"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54899",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54899"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-55243",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55243"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54906",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54906"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54903",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54903"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54907",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54907"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54902",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54902"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54898",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54898"
},
{
"published_at": "2025-09-09",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-54904",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54904"
}
]
}
CERTFR-2025-AVI-0761
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 140.0.3485.54",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-9865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9865"
},
{
"name": "CVE-2025-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53791"
},
{
"name": "CVE-2025-9867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9867"
},
{
"name": "CVE-2025-9866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9866"
},
{
"name": "CVE-2025-9864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9864"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0761",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge. Elles permettent \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9 et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2025-09-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-53791",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53791"
},
{
"published_at": "2025-09-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-9865",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9865"
},
{
"published_at": "2025-09-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-9867",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9867"
},
{
"published_at": "2025-09-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-9864",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9864"
},
{
"published_at": "2025-09-05",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-9866",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9866"
}
]
}
CERTFR-2025-AVI-0689
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 (GDR) versions antérieures à 13.0.6465.1 | ||
| Microsoft | N/A | Microsoft Teams pour Android versions antérieures à 1416/1.0.0.2025102802 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 antérieures à 9.1.38.10 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20518 | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5513.1002 | ||
| Microsoft | N/A | Teams Phones versions antérieures à 1449/1.0.94.2025168802 | ||
| Microsoft | N/A | Teams Panels versions antérieures à 1449/1.0.97.2025102203 | ||
| Microsoft | N/A | Web Deploy 4.0 versions antérieures à 10.0.2001 | ||
| Microsoft | N/A | Microsoft Teams pour iOS versions antérieures à 7.10.1 (100772025102901) | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (CU 31) versions antérieures à 14.0.3500.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (GDR) versions antérieures à 15.0.2140.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (GDR) versions antérieures à 14.0.2080.1 | ||
| Microsoft | N/A | Teams pour D365 Remote Assist HoloLens versions antérieures à 316.2505.28001 | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20041 | ||
| Microsoft | N/A | Microsoft Exchange Server Subscription Edition RTM versions antérieures à 15.02.2562.020 | ||
| Microsoft | N/A | Teams pour D365 Guides Hololens versions antérieures à 907.2505.29001.0 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (GDR) versions antérieures à 16.0.1145.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.14 antérieures à 17.14.12 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (CU 32) versions antérieures à 15.0.4440.1 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 versions antérieures à 15.01.2507.058 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 14 versions antérieures à 15.02.1544.033 | ||
| Microsoft | N/A | Microsoft Teams pour Desktop versions antérieures à 25122.1415.3698.6812 | ||
| Microsoft | N/A | Microsoft Teams pour Mac versions antérieures à 25122.1207.3700.1444 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (CU 20) versions antérieures à 16.0.4210.1 | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 antérieures à 9.1.39 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 15 versions antérieures à 15.02.1748.036 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 (GDR) versions ant\u00e9rieures \u00e0 13.0.6465.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Android versions ant\u00e9rieures \u00e0 1416/1.0.0.2025102802",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1 ant\u00e9rieures \u00e0 9.1.38.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20518",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5513.1002",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Teams Phones versions ant\u00e9rieures \u00e0 1449/1.0.94.2025168802",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Teams Panels versions ant\u00e9rieures \u00e0 1449/1.0.97.2025102203",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Web Deploy 4.0 versions ant\u00e9rieures \u00e0 10.0.2001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour iOS versions ant\u00e9rieures \u00e0 7.10.1 (100772025102901)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (CU 31) versions ant\u00e9rieures \u00e0 14.0.3500.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 15.0.2140.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 14.0.2080.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Teams pour D365 Remote Assist HoloLens versions ant\u00e9rieures \u00e0 316.2505.28001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20041",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server Subscription Edition RTM versions ant\u00e9rieures \u00e0 15.02.2562.020",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Teams pour D365 Guides Hololens versions ant\u00e9rieures \u00e0 907.2505.29001.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 16.0.1145.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.14 ant\u00e9rieures \u00e0 17.14.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 32) versions ant\u00e9rieures \u00e0 15.0.4440.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23 versions ant\u00e9rieures \u00e0 15.01.2507.058",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 14 versions ant\u00e9rieures \u00e0 15.02.1544.033",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Desktop versions ant\u00e9rieures \u00e0 25122.1415.3698.6812",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Mac versions ant\u00e9rieures \u00e0 25122.1207.3700.1444",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 20) versions ant\u00e9rieures \u00e0 16.0.4210.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1 ant\u00e9rieures \u00e0 9.1.39",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 15 versions ant\u00e9rieures \u00e0 15.02.1748.036",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53760"
},
{
"name": "CVE-2025-53772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53772"
},
{
"name": "CVE-2025-53736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53736"
},
{
"name": "CVE-2025-25005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25005"
},
{
"name": "CVE-2025-53727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53727"
},
{
"name": "CVE-2025-47954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47954"
},
{
"name": "CVE-2025-49745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49745"
},
{
"name": "CVE-2025-25006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25006"
},
{
"name": "CVE-2025-49712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49712"
},
{
"name": "CVE-2025-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24999"
},
{
"name": "CVE-2025-53728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53728"
},
{
"name": "CVE-2025-53783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53783"
},
{
"name": "CVE-2025-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49759"
},
{
"name": "CVE-2025-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53733"
},
{
"name": "CVE-2025-53773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53773"
},
{
"name": "CVE-2025-25007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25007"
},
{
"name": "CVE-2025-33051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33051"
},
{
"name": "CVE-2025-49758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49758"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0689",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53733",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53733"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49712",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49712"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53783",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53783"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-25006",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25006"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-25007",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25007"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-33051",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33051"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53772",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53772"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53773",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53773"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53736",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53736"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53727"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49745",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49745"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-24999",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24999"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49759",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49759"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53728",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53728"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53760",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53760"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49758",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49758"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-25005",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25005"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47954",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47954"
}
]
}
CERTFR-2025-AVI-0687
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.4851 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5768 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5768 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8330 | ||
| Microsoft | N/A | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21100 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.4851 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6216 | ||
| Microsoft | N/A | Windows Server 2025 versions antérieures à 10.0.26100.4851 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.25622 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6216 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25622 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7678 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6216 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8330 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6216 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7678 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7678 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1791 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.8330 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23471 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.17763.7678 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23471 | ||
| Microsoft | N/A | Windows Subsystem pour Linux (WSL2) versions antérieures à 2.5.10 | ||
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.3989 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6216 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23471 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.4851 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27820 | ||
| Microsoft | N/A | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21100 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5768 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.22725 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6216 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8330 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23471 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5768 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22725 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3989 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27872 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27872 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.4851",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5768",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5768",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8330",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21100",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.4851",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6216",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.4851",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25622",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6216",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25622",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7678",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6216",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8330",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6216",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7678",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7678",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1791",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8330",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23471",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7678",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23471",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Subsystem pour Linux (WSL2) versions ant\u00e9rieures \u00e0 2.5.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3989",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6216",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23471",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.4851",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27820",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21100",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5768",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22725",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6216",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8330",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23471",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5768",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22725",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3989",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27872",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27872",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-50168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50168"
},
{
"name": "CVE-2025-49751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49751"
},
{
"name": "CVE-2025-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50153"
},
{
"name": "CVE-2025-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50167"
},
{
"name": "CVE-2025-53156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53156"
},
{
"name": "CVE-2025-53769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53769"
},
{
"name": "CVE-2025-50161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50161"
},
{
"name": "CVE-2025-53726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53726"
},
{
"name": "CVE-2025-53719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53719"
},
{
"name": "CVE-2025-53141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53141"
},
{
"name": "CVE-2025-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50166"
},
{
"name": "CVE-2025-49757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49757"
},
{
"name": "CVE-2025-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50162"
},
{
"name": "CVE-2025-53153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53153"
},
{
"name": "CVE-2025-53154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53154"
},
{
"name": "CVE-2025-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53136"
},
{
"name": "CVE-2025-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53778"
},
{
"name": "CVE-2025-50159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50159"
},
{
"name": "CVE-2025-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53144"
},
{
"name": "CVE-2025-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49761"
},
{
"name": "CVE-2025-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50169"
},
{
"name": "CVE-2025-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50155"
},
{
"name": "CVE-2025-50171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50171"
},
{
"name": "CVE-2025-53723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53723"
},
{
"name": "CVE-2025-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50164"
},
{
"name": "CVE-2025-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53721"
},
{
"name": "CVE-2025-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50157"
},
{
"name": "CVE-2025-53720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53720"
},
{
"name": "CVE-2025-53142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53142"
},
{
"name": "CVE-2025-53131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53131"
},
{
"name": "CVE-2025-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50160"
},
{
"name": "CVE-2025-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53134"
},
{
"name": "CVE-2025-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53152"
},
{
"name": "CVE-2025-53788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53788"
},
{
"name": "CVE-2025-53779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53779"
},
{
"name": "CVE-2025-53716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53716"
},
{
"name": "CVE-2025-50154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50154"
},
{
"name": "CVE-2025-53132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53132"
},
{
"name": "CVE-2025-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53133"
},
{
"name": "CVE-2025-50176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50176"
},
{
"name": "CVE-2025-53722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53722"
},
{
"name": "CVE-2025-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53789"
},
{
"name": "CVE-2025-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50172"
},
{
"name": "CVE-2025-49743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49743"
},
{
"name": "CVE-2025-50173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50173"
},
{
"name": "CVE-2025-53718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53718"
},
{
"name": "CVE-2025-48807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48807"
},
{
"name": "CVE-2025-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53151"
},
{
"name": "CVE-2025-53148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53148"
},
{
"name": "CVE-2025-50156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50156"
},
{
"name": "CVE-2025-53155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53155"
},
{
"name": "CVE-2025-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53149"
},
{
"name": "CVE-2025-53135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53135"
},
{
"name": "CVE-2025-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53147"
},
{
"name": "CVE-2025-50170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50170"
},
{
"name": "CVE-2025-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53766"
},
{
"name": "CVE-2025-53138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53138"
},
{
"name": "CVE-2025-53143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53143"
},
{
"name": "CVE-2025-50177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50177"
},
{
"name": "CVE-2025-49762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49762"
},
{
"name": "CVE-2025-53145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53145"
},
{
"name": "CVE-2025-53725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53725"
},
{
"name": "CVE-2025-53724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53724"
},
{
"name": "CVE-2025-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50158"
},
{
"name": "CVE-2025-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50163"
},
{
"name": "CVE-2025-53137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53137"
},
{
"name": "CVE-2025-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50165"
},
{
"name": "CVE-2025-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53140"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0687",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50156",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50156"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53132",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53132"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53141",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53141"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50155",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50155"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53154",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53154"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49751",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49751"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50171",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50171"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53142",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53142"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53778",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53778"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50177",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50177"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53145",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53145"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53716",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53716"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53725",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53725"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53151",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53151"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53131",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53131"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53719",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53719"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49743",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49743"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50154",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50154"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50164",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50164"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53144",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53144"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53722",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53722"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53155",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53155"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50173",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50173"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53135",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53135"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50170",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50170"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53134",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53134"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53779",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53779"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50167",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50167"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53140",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53140"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50161",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50161"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49762",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49762"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53721",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53721"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50165",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50165"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50163",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50163"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50157",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50157"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53718",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53718"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50162",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50162"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53766",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53766"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53769",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53156",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53156"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53138",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53138"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53723",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53723"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53149",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53149"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53720"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49761",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49761"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53724",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53724"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53788",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53788"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50168",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50168"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50166",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50166"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50176",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50176"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50159",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50159"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53136",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53136"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53148",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53148"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53137",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53137"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53726",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53726"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50158",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50158"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48807",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48807"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53152",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53152"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50160",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50160"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53147",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53147"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53133",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53133"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50172",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50172"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53153",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53153"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50169",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50169"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53789",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53789"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50153",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50153"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49757",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49757"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53143",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53143"
}
]
}
CERTFR-2025-AVI-0665
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Office. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft 365 Copilot\u0027s Business Chat",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53774"
},
{
"name": "CVE-2025-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53787"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0665",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Office. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Office",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-53774",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53774"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-53787",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53787"
}
]
}
CERTFR-2025-AVI-0664
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 139.0.3405.86",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0664",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8582",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8582"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8583",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8583"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8581",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8581"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8578",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8578"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8576",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8576"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8580",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8580"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8577",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8577"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8579",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8579"
}
]
}
CERTFR-2025-AVI-0666
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Portal",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Open AI",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53767"
},
{
"name": "CVE-2025-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53792"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0666",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53767",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767"
},
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53792",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792"
}
]
}
CERTFR-2025-AVI-0659
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Microsoft Exchange Server. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 14 versions antérieures à 15.02.1544.025 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 15 versions antérieures à 15.02.1748.024 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 versions antérieures à 15.01.2507.055 | ||
| Microsoft | N/A | Microsoft Exchange Server Subscription Edition RTM versions antérieures à 15.02.2562.017 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 14 versions ant\u00e9rieures \u00e0 15.02.1544.025",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 15 versions ant\u00e9rieures \u00e0 15.02.1748.024",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23 versions ant\u00e9rieures \u00e0 15.01.2507.055",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server Subscription Edition RTM versions ant\u00e9rieures \u00e0 15.02.2562.017",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53786"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0659",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-07T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Exchange Server. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Exchange Server",
"vendor_advisories": [
{
"published_at": "2025-08-06",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53786",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786"
}
]
}
CERTFR-2025-AVI-0646
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Microsoft Edge. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 138.0.3351.121",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0646",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Edge. Elle permet \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2025-07-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8292",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8292"
}
]
}
CERTFR-2025-AVI-0629
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 138.0.3351.109",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0629",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2025-07-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8010",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8010"
},
{
"published_at": "2025-07-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-8011",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8011"
}
]
}
CERTFR-2025-AVI-0611
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un contournement de la politique de sécurité.
Microsoft indique que la vulnérabilité CVE-2025-53770 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | SharePoint Enterprise Server 2016 | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5513.1001 | ||
| Microsoft | SharePoint Server 2019 | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20037 | ||
| Microsoft | SharePoint Server Subscription Edition | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20508 | ||
| Microsoft | SharePoint Enterprise Server 2013 | Microsoft SharePoint Enterprise Server 2013 toutes versions | ||
| Microsoft | N/A | Microsoft Purview | ||
| Microsoft | SharePoint Enterprise Server 2010 | Microsoft SharePoint Enterprise Server 2010 toutes versions |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5513.1001",
"product": {
"name": "SharePoint Enterprise Server 2016",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20037",
"product": {
"name": "SharePoint Server 2019",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20508",
"product": {
"name": "SharePoint Server Subscription Edition",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2013 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2013",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Purview",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2010 toutes versions",
"product": {
"name": "SharePoint Enterprise Server 2010",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53762"
},
{
"name": "CVE-2025-53770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53770"
},
{
"name": "CVE-2025-53771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53771"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0611",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-21T00:00:00.000000"
},
{
"description": " Mises \u00e0 jour de s\u00e9curit\u00e9 pour SharePoint Enterprise Server 2016 disponibles.",
"revision_date": "2025-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un contournement de la politique de s\u00e9curit\u00e9.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-53770 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-07-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771"
},
{
"published_at": "2025-07-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770"
},
{
"published_at": "2025-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-53762",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762"
}
]
}
CERTFR-2025-AVI-0610
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Machine Learning",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure DevOps",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47995"
},
{
"name": "CVE-2025-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47158"
},
{
"name": "CVE-2025-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49746"
},
{
"name": "CVE-2025-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49747"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0610",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-21T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49747",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747"
},
{
"published_at": "2025-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49746",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746"
},
{
"published_at": "2025-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-47158",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158"
},
{
"published_at": "2025-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-47995",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995"
}
]
}
CERTFR-2025-AVI-0594
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Microsoft indique que la vulnérabilité CVE-2025-6558 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 138.0.3351.95",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0594",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-6558 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2025-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-7656",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7656"
},
{
"published_at": "2025-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-6558",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6558"
},
{
"published_at": "2025-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-7657",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7657"
}
]
}
CERTFR-2025-AVI-0577
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25573 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22676 | ||
| Microsoft | N/A | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21073 | ||
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.3807 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7558 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5624 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.10240.21034 | ||
| Microsoft | N/A | Windows App Client pour Windows Desktop versions antérieures à 2.0.559.0 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.4652 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6093 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3932 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7558 | ||
| Microsoft | N/A | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21073 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.17763.7558 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23418 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27820 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6093 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6093 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5624 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23418 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23418 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23418 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.4652 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7558 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1732 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8246 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.22620 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.22621.5472 | ||
| Microsoft | N/A | Windows Server 2025 versions antérieures à 10.0.26100.4652 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.25522 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.10240.21034 | ||
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.3932 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27820 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8246 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5624 | ||
| Microsoft | N/A | Windows Server 2025 versions antérieures à 10.0.26200.4349 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8148 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3807 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25522 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6093 | ||
| Microsoft | N/A | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.4652 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5624 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.8148 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.8246 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.25573 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.22676 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8246 | ||
| Microsoft | N/A | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26200.4349 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6093 | ||
| Microsoft | N/A | Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6353.0 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6093 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22620 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25573",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22676",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21073",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3807",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7558",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5624",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.10240.21034",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.559.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.4652",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6093",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3932",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7558",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21073",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7558",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23418",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27820",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6093",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6093",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5624",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23418",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23418",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23418",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.4652",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7558",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1732",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8246",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22620",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.22621.5472",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.4652",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25522",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.10240.21034",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3932",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27820",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8246",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5624",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26200.4349",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8148",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3807",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25522",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6093",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.4652",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5624",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8148",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8246",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25573",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22676",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8246",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26200.4349",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6093",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6353.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6093",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22620",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47976"
},
{
"name": "CVE-2025-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36357"
},
{
"name": "CVE-2025-49682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49682"
},
{
"name": "CVE-2025-49733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49733"
},
{
"name": "CVE-2025-49681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49681"
},
{
"name": "CVE-2025-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49732"
},
{
"name": "CVE-2025-49693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49693"
},
{
"name": "CVE-2025-48805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48805"
},
{
"name": "CVE-2025-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48802"
},
{
"name": "CVE-2025-48822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48822"
},
{
"name": "CVE-2025-49730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49730"
},
{
"name": "CVE-2025-47996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47996"
},
{
"name": "CVE-2025-47984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47984"
},
{
"name": "CVE-2025-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49674"
},
{
"name": "CVE-2025-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49672"
},
{
"name": "CVE-2025-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48809"
},
{
"name": "CVE-2025-47991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47991"
},
{
"name": "CVE-2025-49664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49664"
},
{
"name": "CVE-2025-47980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47980"
},
{
"name": "CVE-2025-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49716"
},
{
"name": "CVE-2025-49740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49740"
},
{
"name": "CVE-2025-47999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47999"
},
{
"name": "CVE-2025-49660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49660"
},
{
"name": "CVE-2025-49724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49724"
},
{
"name": "CVE-2025-49687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49687"
},
{
"name": "CVE-2025-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49670"
},
{
"name": "CVE-2025-48002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48002"
},
{
"name": "CVE-2025-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48816"
},
{
"name": "CVE-2025-49669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49669"
},
{
"name": "CVE-2025-47975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47975"
},
{
"name": "CVE-2025-47978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47978"
},
{
"name": "CVE-2025-49666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49666"
},
{
"name": "CVE-2025-49680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49680"
},
{
"name": "CVE-2025-49667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49667"
},
{
"name": "CVE-2025-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48804"
},
{
"name": "CVE-2025-47998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47998"
},
{
"name": "CVE-2025-49678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49678"
},
{
"name": "CVE-2025-48000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48000"
},
{
"name": "CVE-2025-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49688"
},
{
"name": "CVE-2025-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48823"
},
{
"name": "CVE-2025-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49671"
},
{
"name": "CVE-2025-49689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49689"
},
{
"name": "CVE-2025-49676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49676"
},
{
"name": "CVE-2025-49725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49725"
},
{
"name": "CVE-2025-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48818"
},
{
"name": "CVE-2025-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48815"
},
{
"name": "CVE-2025-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48800"
},
{
"name": "CVE-2025-47982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47982"
},
{
"name": "CVE-2025-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48806"
},
{
"name": "CVE-2025-49735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49735"
},
{
"name": "CVE-2025-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49760"
},
{
"name": "CVE-2025-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48810"
},
{
"name": "CVE-2025-48824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48824"
},
{
"name": "CVE-2025-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49675"
},
{
"name": "CVE-2025-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26636"
},
{
"name": "CVE-2025-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49691"
},
{
"name": "CVE-2025-48808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48808"
},
{
"name": "CVE-2025-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49722"
},
{
"name": "CVE-2025-49665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49665"
},
{
"name": "CVE-2025-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49744"
},
{
"name": "CVE-2025-48814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48814"
},
{
"name": "CVE-2025-49685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49685"
},
{
"name": "CVE-2025-47986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47986"
},
{
"name": "CVE-2025-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49673"
},
{
"name": "CVE-2025-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49659"
},
{
"name": "CVE-2025-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49726"
},
{
"name": "CVE-2025-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48799"
},
{
"name": "CVE-2025-49727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49727"
},
{
"name": "CVE-2025-48820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48820"
},
{
"name": "CVE-2025-47973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47973"
},
{
"name": "CVE-2025-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49723"
},
{
"name": "CVE-2025-47981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47981"
},
{
"name": "CVE-2025-47159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47159"
},
{
"name": "CVE-2025-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49679"
},
{
"name": "CVE-2025-48821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48821"
},
{
"name": "CVE-2025-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49657"
},
{
"name": "CVE-2025-33054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33054"
},
{
"name": "CVE-2025-49694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49694"
},
{
"name": "CVE-2025-49677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49677"
},
{
"name": "CVE-2025-49668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49668"
},
{
"name": "CVE-2025-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49663"
},
{
"name": "CVE-2025-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48817"
},
{
"name": "CVE-2025-49690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49690"
},
{
"name": "CVE-2025-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49742"
},
{
"name": "CVE-2025-47993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47993"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-48003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48003"
},
{
"name": "CVE-2025-49686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49686"
},
{
"name": "CVE-2025-47987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47987"
},
{
"name": "CVE-2025-48811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48811"
},
{
"name": "CVE-2025-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49658"
},
{
"name": "CVE-2025-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49721"
},
{
"name": "CVE-2025-49729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49729"
},
{
"name": "CVE-2025-47985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47985"
},
{
"name": "CVE-2025-48001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48001"
},
{
"name": "CVE-2025-49661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49661"
},
{
"name": "CVE-2025-49753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49753"
},
{
"name": "CVE-2025-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48819"
},
{
"name": "CVE-2025-49683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49683"
},
{
"name": "CVE-2025-47972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47972"
},
{
"name": "CVE-2025-48803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48803"
},
{
"name": "CVE-2025-49684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49684"
},
{
"name": "CVE-2025-47971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47971"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0577",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-09T00:00:00.000000"
},
{
"description": "Remplacement de l\u0027identifiant CVE-2025-36350 par CVE-2024-36350",
"revision_date": "2025-07-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48805",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48805"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49684",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49684"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49722",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49722"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47986",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47986"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48824",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48824"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48003",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48003"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49687",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49687"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48819",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48819"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49742",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49742"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48821",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48821"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49669",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49669"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47984",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47984"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49716",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49716"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47981",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47981"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49724",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49724"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49672",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49672"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49729"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47972",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47972"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47991",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47991"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49726",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49726"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49690",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49690"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49721",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49721"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47996",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47996"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48822",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48822"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47985",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47985"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49723",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49723"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48811",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48811"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49735",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49735"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48817",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48817"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49659",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49659"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49694",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49694"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47975",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47975"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49725",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49725"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49668",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49668"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49686",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49686"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47982",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47982"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49681",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49681"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49670",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49670"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49665",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49665"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48823",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48823"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49671",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49671"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48808",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48808"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48000",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48000"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49760",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49760"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48002",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48002"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49753",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49753"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47978",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47978"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47980",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47980"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49674",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49674"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47976",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47976"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47973",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47973"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49660",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49660"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49667",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49667"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48001",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48001"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48804",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48804"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49693",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49693"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49675",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49675"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48809",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48809"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49691",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49691"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49661",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49661"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49689",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49689"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49677",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49677"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49658",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49658"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48800",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48800"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49680",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49680"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48802",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48802"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49685",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49685"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49730",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49730"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47159",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47159"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49733",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49733"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49683",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49683"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26636",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26636"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49679",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49679"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49657",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49657"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48814",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48814"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47993",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47993"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49673",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49673"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49732",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49732"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48806",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48806"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49744",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49744"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48799",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48799"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49688",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49688"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49678",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49678"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49676",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49676"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47987",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47987"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49740",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49740"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49663",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49663"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48810",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48810"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-36357",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-36357"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49664",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49664"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47999",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47999"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-36350",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-36350"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48816"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47971",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47971"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49682",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49682"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48803",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48803"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47998",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47998"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48820",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48820"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48818",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48818"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49666",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49666"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48815",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48815"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33054",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33054"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49727"
}
]
}
CERTFR-2025-AVI-0579
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Python extension pour Visual Studio Code versions antérieures à 2025.8.1 | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5508.1000 | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20027 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (CU 31) versions antérieures à 14.0.3495.9 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20424 | ||
| Microsoft | N/A | Microsoft Teams pour iOS versions antérieures à 7.10.1 (100772025102901) | ||
| Microsoft | N/A | Microsoft Configuration Manager 2503 versions antérieures à 5.00.9135.1003 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.12 antérieures à 17.12.10 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (inclus 16.0 - 16.10) antérieures à 16.11.49 | ||
| Microsoft | N/A | Microsoft Teams pour Desktop versions antérieures à 25060212643 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (CU 19) versions antérieures à 16.0.1140.6 | ||
| Microsoft | N/A | Microsoft Teams pour Android versions antérieures à 1.0.0.2025112902 | ||
| Microsoft | N/A | Microsoft Visual Studio 2015 Update 3 versions antérieures à 14.0.27564.0 | ||
| Microsoft | N/A | Microsoft SQL Server 2017 pour systèmes x64 (GDR) versions antérieures à 14.0.2075.8 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 2 (GDR) versions antérieures à 13.0.6460.7 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (CU 32) versions antérieures à 15.0.4435.7 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.14 antérieures à 17.14.8 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (inclus 15.0 - 15.8) antérieures à 15.9.75 | ||
| Microsoft | N/A | Microsoft Teams pour Mac versions antérieures à 25163.3001.3726.6503 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.10 antérieures à 17.10.17 | ||
| Microsoft | N/A | Microsoft PC Manager versions antérieures à 3.17.4 | ||
| Microsoft | N/A | Microsoft SQL Server 2022 pour systèmes x64 (GDR) versions antérieures à 16.0.4200.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.8 antérieures à 17.8.23 | ||
| Microsoft | N/A | Microsoft SQL Server 2019 pour systèmes x64 (GDR) versions antérieures à 15.0.2135.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Python extension pour Visual Studio Code versions ant\u00e9rieures \u00e0 2025.8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5508.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20027",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (CU 31) versions ant\u00e9rieures \u00e0 14.0.3495.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20424",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour iOS versions ant\u00e9rieures \u00e0 7.10.1 (100772025102901)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Configuration Manager 2503 versions ant\u00e9rieures \u00e0 5.00.9135.1003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.12 ant\u00e9rieures \u00e0 17.12.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (inclus 16.0 - 16.10) ant\u00e9rieures \u00e0 16.11.49",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Desktop versions ant\u00e9rieures \u00e0 25060212643",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (CU 19) versions ant\u00e9rieures \u00e0 16.0.1140.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Android versions ant\u00e9rieures \u00e0 1.0.0.2025112902",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2015 Update 3 versions ant\u00e9rieures \u00e0 14.0.27564.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2017 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 14.0.2075.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 2 (GDR) versions ant\u00e9rieures \u00e0 13.0.6460.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (CU 32) versions ant\u00e9rieures \u00e0 15.0.4435.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.14 ant\u00e9rieures \u00e0 17.14.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (inclus 15.0 - 15.8) ant\u00e9rieures \u00e0 15.9.75",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Teams pour Mac versions ant\u00e9rieures \u00e0 25163.3001.3726.6503",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.10 ant\u00e9rieures \u00e0 17.10.17",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft PC Manager versions ant\u00e9rieures \u00e0 3.17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2022 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 \t\n16.0.4200.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.8 ant\u00e9rieures \u00e0 17.8.23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2019 pour syst\u00e8mes x64 (GDR) versions ant\u00e9rieures \u00e0 15.0.2135.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46835"
},
{
"name": "CVE-2025-49714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49714"
},
{
"name": "CVE-2025-47178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47178"
},
{
"name": "CVE-2025-27614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27614"
},
{
"name": "CVE-2025-49701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49701"
},
{
"name": "CVE-2025-48385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48385"
},
{
"name": "CVE-2025-27613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27613"
},
{
"name": "CVE-2025-49737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49737"
},
{
"name": "CVE-2025-49706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49706"
},
{
"name": "CVE-2025-49738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49738"
},
{
"name": "CVE-2025-48384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48384"
},
{
"name": "CVE-2025-49704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49704"
},
{
"name": "CVE-2025-48386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48386"
},
{
"name": "CVE-2025-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49739"
},
{
"name": "CVE-2025-49719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49719"
},
{
"name": "CVE-2025-49717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49717"
},
{
"name": "CVE-2025-46334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46334"
},
{
"name": "CVE-2025-49718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49718"
},
{
"name": "CVE-2025-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49731"
},
{
"name": "CVE-2025-49703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49703"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0579",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49718",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49718"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-27614",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27614"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49739",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49739"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46835",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46835"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49714",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49714"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49731"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49717",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49717"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-27613",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27613"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49719",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49719"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49703",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49703"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-48386",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48386"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-48385",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48385"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49706",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49738",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49738"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49737",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49737"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49704",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-48384",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48384"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-46334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46334"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49701",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49701"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47178",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47178"
}
]
}
CERTFR-2025-AVI-0576
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Office. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Outlook 2016 (édition 32 bits) versions antérieures à 16.0.5508.1002 | ||
| Microsoft | N/A | Microsoft Office 2016 (édition 64 bits) versions antérieures à 16.0.5508.1001 | ||
| Microsoft | N/A | Microsoft Office LTSC pour Mac 2024 | ||
| Microsoft | N/A | Microsoft Word 2016 (édition 32 bits) versions antérieures à 16.0.5508.1001 | ||
| Microsoft | N/A | Microsoft Office LTSC 2024 pour éditions 64 bits | ||
| Microsoft | N/A | Microsoft Office LTSC pour Mac 2021 | ||
| Microsoft | N/A | Microsoft Office LTSC 2021 pour éditions 32 bits | ||
| Microsoft | N/A | Microsoft Office 2019 pour éditions 32 bits | ||
| Microsoft | N/A | Microsoft Excel 2016 (édition 64 bits) versions antérieures à 16.0.5508.1001 | ||
| Microsoft | N/A | Microsoft Word 2016 (édition 32 bits) versions antérieures à 16.0.5508.1000 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft Office 2019 pour éditions 64 bits | ||
| Microsoft | N/A | Microsoft Office LTSC 2024 pour éditions 32 bits | ||
| Microsoft | N/A | Microsoft Word 2016 (édition 64 bits) versions antérieures à 16.0.5508.1001 | ||
| Microsoft | N/A | Microsoft Outlook 2016 (édition 64 bits) versions antérieures à 16.0.5508.1002 | ||
| Microsoft | N/A | Microsoft Excel 2016 (édition 32 bits) versions antérieures à 16.0.5508.1001 | ||
| Microsoft | N/A | Microsoft PowerPoint 2016 (édition 32 bits) versions antérieures à 16.0.5508.1000 | ||
| Microsoft | N/A | Microsoft Word 2016 (édition 64 bits) versions antérieures à 16.0.5508.1000 | ||
| Microsoft | N/A | Microsoft Office 2016 (édition 32 bits) versions antérieures à 16.0.5508.1001 | ||
| Microsoft | N/A | Microsoft Office LTSC 2021 pour éditions 64 bits | ||
| Microsoft | N/A | Microsoft PowerPoint 2016 (édition 64 bits) versions antérieures à 16.0.5508.1000 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 64 bits | ||
| Microsoft | N/A | Microsoft Office pour Android versions antérieures à 16.0.19029.20000 | ||
| Microsoft | N/A | Office Online Server versions antérieures à 16.0.10417.20027 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Outlook 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1002",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC pour Mac 2024",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Word 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2024 pour \u00e9ditions 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC pour Mac 2021",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2021 pour \u00e9ditions 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2019 pour \u00e9ditions 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Excel 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Word 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2019 pour \u00e9ditions 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2024 pour \u00e9ditions 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Word 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Outlook 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1002",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Excel 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft PowerPoint 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Word 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2021 pour \u00e9ditions 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft PowerPoint 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5508.1000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office pour Android versions ant\u00e9rieures \u00e0 16.0.19029.20000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Office Online Server versions ant\u00e9rieures \u00e0 16.0.10417.20027",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47994"
},
{
"name": "CVE-2025-49696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49696"
},
{
"name": "CVE-2025-49702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49702"
},
{
"name": "CVE-2025-49705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49705"
},
{
"name": "CVE-2025-49700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49700"
},
{
"name": "CVE-2025-49711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49711"
},
{
"name": "CVE-2025-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49698"
},
{
"name": "CVE-2025-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49697"
},
{
"name": "CVE-2025-49695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49695"
},
{
"name": "CVE-2025-49703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49703"
},
{
"name": "CVE-2025-49756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49756"
},
{
"name": "CVE-2025-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49699"
},
{
"name": "CVE-2025-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48812"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0576",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Office. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Office",
"vendor_advisories": [
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49705",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49705"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49711",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49711"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-48812",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48812"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49702",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49702"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49695",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49695"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49697",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49697"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49699",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49699"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49696",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49696"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49700",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49700"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-47994",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47994"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49756",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49756"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49698",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49698"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2025-49703",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49703"
}
]
}
CERTFR-2025-AVI-0578
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Azure Monitor Agent versions antérieures à 1.35.1 | ||
| Microsoft | N/A | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 Azure Connect Feature Pack versions antérieures à 13.0.7055.9 | ||
| Microsoft | N/A | Azure Service Fabric versions antérieures à 10.1 Cumulative Update 7.0 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Monitor Agent versions ant\u00e9rieures \u00e0 1.35.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 Azure Connect Feature Pack versions ant\u00e9rieures \u00e0 13.0.7055.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Service Fabric versions ant\u00e9rieures \u00e0 10.1 Cumulative Update 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47988"
},
{
"name": "CVE-2025-21195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21195"
},
{
"name": "CVE-2025-49719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49719"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0578",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49719",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49719"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-21195",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21195"
},
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-47988",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47988"
}
]
}
CERTFR-2025-AVI-0527
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans les produits Microsoft. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Dynamics 365 FastTrack Implementation",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-49715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49715"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0527",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits Microsoft. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Vuln\u00e9rabilit\u00e9 dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-06-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-49715",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49715"
}
]
}
CERTFR-2025-AVI-0526
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 137.0.3296.93",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0526",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2025-06-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-6192",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6192"
},
{
"published_at": "2025-06-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-6191",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6191"
}
]
}
CERTFR-2025-AVI-0513
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Edge. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Edge versions ant\u00e9rieures \u00e0 137.0.3296.83",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0513",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Edge. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Edge",
"vendor_advisories": [
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-5959",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5959"
},
{
"published_at": "2025-06-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Edge CVE-2025-5958",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-5958"
}
]
}
CERTFR-2025-AVI-0501
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Nuance Digital Engagement Platform versions antérieures à 5.64.x | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5504.1001 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20396 | ||
| Microsoft | N/A | Microsoft AutoUpdate pour Mac versions antérieures à 4.79 | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20018 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.14 antérieures à 17.14.5 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.10 antérieures à 17.10.16 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.12 antérieures à 17.12.9 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.8 antérieures à 17.8.22 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Nuance Digital Engagement Platform versions ant\u00e9rieures \u00e0 5.64.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5504.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20396",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft AutoUpdate pour Mac versions ant\u00e9rieures \u00e0 4.79",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20018",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.14 ant\u00e9rieures \u00e0 17.14.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.10 ant\u00e9rieures \u00e0 17.10.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.12 ant\u00e9rieures \u00e0 17.12.9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.8 ant\u00e9rieures \u00e0 17.8.22",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47959"
},
{
"name": "CVE-2025-47968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47968"
},
{
"name": "CVE-2025-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47169"
},
{
"name": "CVE-2025-47163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47163"
},
{
"name": "CVE-2025-30399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30399"
},
{
"name": "CVE-2025-47172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47172"
},
{
"name": "CVE-2025-47168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47168"
},
{
"name": "CVE-2025-47977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47977"
},
{
"name": "CVE-2025-47166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47166"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0501",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47959",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47959"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-30399",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30399"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47172",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47172"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47169",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47169"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47168",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47168"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47166",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47166"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47968",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47968"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47163",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47163"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47977"
}
]
}
CERTFR-2025-AVI-0419
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte Microsoft Defender pour Endpoint. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Defender pour Endpoint sur Linux versions ant\u00e9rieures \u00e0 101.25022.0002",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-47161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47161"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0419",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-16T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte Microsoft Defender pour Endpoint. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Defender pour Endpoint",
"vendor_advisories": [
{
"published_at": "2025-05-15",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-47161",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47161"
}
]
}
CERTFR-2025-AVI-0405
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que les vulnérabilités CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025-32706 et CVE-2025-32709 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.22577 | ||
| Microsoft | N/A | Windows HLK Version 1809 versions antérieures à 10.1.17763.7010 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7314 | ||
| Microsoft | N/A | Windows App Client pour Windows Desktop versions antérieures à 2.0.420 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.17763.7314 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7314 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5335 | ||
| Microsoft | N/A | Windows 10 HLK version 20H2 antérieures à 10.1.19041.5609 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows HLK pour Windows 10 version 2004 antérieures à 10.1.19041.5609 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows 11 HLK 22H2 versions antérieures à 10.1.22621.5040 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5335 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23279 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27729 | ||
| Microsoft | N/A | Windows HLK pour Windows Server 2019 versions antérieures à 10.1.17763.7010 | ||
| Microsoft | N/A | Windows 10 HLK version 21H1 antérieures à 10.1.19041.5609 | ||
| Microsoft | N/A | Windows Server 2025 versions antérieures à 10.0.26100.3981 | ||
| Microsoft | N/A | Windows 10 HLK version 21H2 antérieures à 10.1.19041.5609 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5335 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8066 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27729 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23279 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5854 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23279 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5854 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5854 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5854 | ||
| Microsoft | N/A | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21014 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23279 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5854 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3630 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5854 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8066 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25475 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.8066 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows HLK pour Windows Server 2025 versions antérieures à 10.1.26100.3478 | ||
| Microsoft | N/A | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21014 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.3981 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5335 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.25475 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3692 | ||
| Microsoft | N/A | Windows 10 HLK Version 22H2 versions antérieures à 10.1.19041.5609 | ||
| Microsoft | N/A | Windows HLK pour Windows Server 2022 versions antérieures à 10.1.20348.3330 | ||
| Microsoft | N/A | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.3981 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1611 | ||
| Microsoft | N/A | Windows 11 HLK 24H2 versions antérieures à 10.1.26100.3478 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8066 | ||
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.3630 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7314 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22577 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.003 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.3981 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22577",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows HLK Version 1809 versions ant\u00e9rieures \u00e0 10.1.17763.7010",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7314",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.420",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7314",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7314",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 HLK version 20H2 ant\u00e9rieures \u00e0 10.1.19041.5609",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows HLK pour Windows 10 version 2004 ant\u00e9rieures \u00e0 10.1.19041.5609",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 HLK 22H2 versions ant\u00e9rieures \u00e0 10.1.22621.5040",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5335",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23279",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27729",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows HLK pour Windows Server 2019 versions ant\u00e9rieures \u00e0 10.1.17763.7010",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 HLK version 21H1 ant\u00e9rieures \u00e0 10.1.19041.5609",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 HLK version 21H2 ant\u00e9rieures \u00e0 10.1.19041.5609",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8066",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27729",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23279",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5854",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23279",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5854",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5854",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5854",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21014",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23279",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5854",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3630",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5854",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8066",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25475",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8066",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows HLK pour Windows Server 2025 versions ant\u00e9rieures \u00e0 10.1.26100.3478",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21014",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5335",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25475",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3692",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 HLK Version 22H2 versions ant\u00e9rieures \u00e0 10.1.19041.5609",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows HLK pour Windows Server 2022 versions ant\u00e9rieures \u00e0 10.1.20348.3330",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.3981",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1611",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 HLK 24H2 versions ant\u00e9rieures \u00e0 10.1.26100.3478",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8066",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3630",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7314",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22577",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-29840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29840"
},
{
"name": "CVE-2025-29836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29836"
},
{
"name": "CVE-2025-30400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30400"
},
{
"name": "CVE-2025-29830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29830"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2025-29954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29954"
},
{
"name": "CVE-2025-29833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29833"
},
{
"name": "CVE-2025-29835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29835"
},
{
"name": "CVE-2025-27488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27488"
},
{
"name": "CVE-2025-26677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26677"
},
{
"name": "CVE-2025-29967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29967"
},
{
"name": "CVE-2025-30394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30394"
},
{
"name": "CVE-2025-29974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29974"
},
{
"name": "CVE-2025-29962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29962"
},
{
"name": "CVE-2025-29961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29961"
},
{
"name": "CVE-2025-24063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24063"
},
{
"name": "CVE-2025-29838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29838"
},
{
"name": "CVE-2025-29955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29955"
},
{
"name": "CVE-2025-29959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29959"
},
{
"name": "CVE-2025-29956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29956"
},
{
"name": "CVE-2025-27468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27468"
},
{
"name": "CVE-2025-30385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30385"
},
{
"name": "CVE-2025-29841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29841"
},
{
"name": "CVE-2025-29832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29832"
},
{
"name": "CVE-2025-29963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29963"
},
{
"name": "CVE-2025-32706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32706"
},
{
"name": "CVE-2025-29968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29968"
},
{
"name": "CVE-2025-29966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29966"
},
{
"name": "CVE-2025-29839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29839"
},
{
"name": "CVE-2025-32709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32709"
},
{
"name": "CVE-2025-29831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29831"
},
{
"name": "CVE-2025-29837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29837"
},
{
"name": "CVE-2025-29958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29958"
},
{
"name": "CVE-2025-29842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29842"
},
{
"name": "CVE-2025-29960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29960"
},
{
"name": "CVE-2025-29964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29964"
},
{
"name": "CVE-2025-32707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32707"
},
{
"name": "CVE-2025-29970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29970"
},
{
"name": "CVE-2025-30397",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30397"
},
{
"name": "CVE-2025-32701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32701"
},
{
"name": "CVE-2025-29957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29957"
},
{
"name": "CVE-2025-30388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30388"
},
{
"name": "CVE-2025-29829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29829"
},
{
"name": "CVE-2025-29971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29971"
},
{
"name": "CVE-2025-29969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29969"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0405",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025-32706 et CVE-2025-32709 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29839",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29839"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-30385",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30385"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29831",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29831"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29836",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29836"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27468",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27468"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29967",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29967"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29955",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29955"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-30397",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29830",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29835",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29835"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27488",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27488"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29964",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29964"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29970"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29833",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29833"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26677",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26677"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29832",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29832"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26646",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29960",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29960"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29838",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29838"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29841",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29841"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29962",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29962"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29969"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32706",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29961",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29961"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29958",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29958"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29837",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29837"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32707",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32707"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29840",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29840"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29971",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29971"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29966",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29966"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29974",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29974"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-30394",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30394"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29829",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29829"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29842",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29842"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29957",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29957"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-30388",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30388"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24063",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24063"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29954",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29954"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-30400",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32701",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29956",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29956"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29968",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29968"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32709",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29959",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29959"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29963",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29963"
}
]
}
CERTFR-2025-AVI-0408
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.13 antérieures à 17.13.7 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.10 antérieures à 17.10.14 | ||
| Microsoft | N/A | Build Tools pour Visual Studio 2022 versions antérieures à 17.13.7 | ||
| Microsoft | N/A | Microsoft Defender pour Identity | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition versions antérieures à 16.0.18526.20286 | ||
| Microsoft | N/A | Visual Studio Code versions antérieures à 1.100.1 | ||
| Microsoft | N/A | Microsoft Defender pour Endpoint pour Linux versions antérieures à 101.25XXX | ||
| Microsoft | N/A | Microsoft PC Manager versions antérieures à 3.16.1.0 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.8 antérieures à 17.8.21 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.12 antérieures à 17.12.8 | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 versions antérieures à 16.0.10417.20010 | ||
| Microsoft | N/A | Microsoft Dataverse versions antérieures à 3.4.0.1406 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.x antérieures à 15.9.73 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.x antérieures à 16.11.47 | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 versions antérieures à 16.0.5500.1001 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Visual Studio 2022 version 17.13 ant\u00e9rieures \u00e0 17.13.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.10 ant\u00e9rieures \u00e0 17.10.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Build Tools pour Visual Studio 2022 versions ant\u00e9rieures \u00e0 17.13.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Defender pour Identity",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition versions ant\u00e9rieures \u00e0 16.0.18526.20286",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code versions ant\u00e9rieures \u00e0 1.100.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Defender pour Endpoint pour Linux versions ant\u00e9rieures \u00e0 101.25XXX",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft PC Manager versions ant\u00e9rieures \u00e0 3.16.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.8 ant\u00e9rieures \u00e0 17.8.21",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.12 ant\u00e9rieures \u00e0 17.12.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019 versions ant\u00e9rieures \u00e0 16.0.10417.20010",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dataverse versions ant\u00e9rieures \u00e0 3.4.0.1406",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.x ant\u00e9rieures \u00e0 15.9.73",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.x ant\u00e9rieures \u00e0 16.11.47",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016 versions ant\u00e9rieures \u00e0 16.0.5500.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-29976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29976"
},
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
},
{
"name": "CVE-2025-30384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30384"
},
{
"name": "CVE-2025-30378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30378"
},
{
"name": "CVE-2025-30382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30382"
},
{
"name": "CVE-2025-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26684"
},
{
"name": "CVE-2025-29826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29826"
},
{
"name": "CVE-2025-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26685"
},
{
"name": "CVE-2025-32702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32702"
},
{
"name": "CVE-2025-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21264"
},
{
"name": "CVE-2025-29975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29975"
},
{
"name": "CVE-2025-32703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32703"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0408",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-32703",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32703"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-29975",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29975"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-21264",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21264"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-32702",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-29976",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29976"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-29826",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29826"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-26646",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-30382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30382"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-26684",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26684"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-30384",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30384"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-26685",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685"
},
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-30378",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30378"
}
]
}
CERTFR-2025-AVI-0406
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Microsoft .Net. Elle permet à un attaquant de provoquer un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | .NET 9.0 sur Mac OS versions antérieures à 9.0.5 | ||
| Microsoft | N/A | .NET 8.0 sur Linux versions antérieures à 8.0.16 | ||
| Microsoft | N/A | .NET 8.0 sur Windows versions antérieures à 8.0.16 | ||
| Microsoft | N/A | .NET 8.0 sur Mac OS versions antérieures à 8.0.16 | ||
| Microsoft | N/A | .NET 9.0 sur Linux versions antérieures à 9.0.5 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": ".NET 9.0 sur Mac OS versions ant\u00e9rieures \u00e0 9.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": ".NET 8.0 sur Linux versions ant\u00e9rieures \u00e0 8.0.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": ".NET 8.0 sur Windows versions ant\u00e9rieures \u00e0 8.0.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": ".NET 8.0 sur Mac OS versions ant\u00e9rieures \u00e0 8.0.16",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": ".NET 9.0 sur Linux versions ant\u00e9rieures \u00e0 9.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-26646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26646"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0406",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft .Net. Elle permet \u00e0 un attaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft .Net",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft .Net CVE-2025-26646",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26646"
}
]
}