Search criteria

4275 vulnerabilities found for windows by microsoft

CERTFR-2025-AVI-1104

Vulnerability from certfr_avis - Published: 2025-12-12 - Updated: 2025-12-12

Une vulnérabilité a été découverte dans Microsoft Windows Admin Center. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows Admin Center versions antérieures à 2.6.2.6
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Admin Center versions ant\u00e9rieures \u00e0 2.6.2.6",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-64669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-64669"
    }
  ],
  "initial_release_date": "2025-12-12T00:00:00",
  "last_revision_date": "2025-12-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-1104",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-12-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows Admin Center. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows Admin Center",
  "vendor_advisories": [
    {
      "published_at": "2025-12-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-64669",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64669"
    }
  ]
}

CERTFR-2025-AVI-0996

Vulnerability from certfr_avis - Published: 2025-11-12 - Updated: 2025-11-12

De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Microsoft indique que la vulnérabilité CVE-2025-62215 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6575
Microsoft Windows Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8594
Microsoft Windows Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21161
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.7092
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.4346
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4346
Microsoft Windows Windows Subsystem pour Linux GUI versions antérieures à 2.6.2
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25768
Microsoft Windows Windows Server 2019 versions antérieures à 10.0.17763.8027
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6575
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6575
Microsoft Windows Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22631.6060
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.6199
Microsoft Windows Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.8027
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6575
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6575
Microsoft Windows Windows Server 2012 versions antérieures à 6.2.9200.25768
Microsoft Windows Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.8027
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.28021
Microsoft Windows Windows 11 Version 25H2 pour systèmes ARM64 versions antérieures à 10.0.26200.7092
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6575
Microsoft Windows Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8594
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.7092
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23624
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23624
Microsoft Windows Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8594
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6060
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23624
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22869
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.28021
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.7092
Microsoft Windows Windows Server 2016 versions antérieures à 10.0.14393.8594
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1965
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23624
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.7092
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6199
Microsoft Windows Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.8027
Microsoft Windows Windows 11 Version 25H2 pour systèmes x64 versions antérieures à 10.0.26200.7092
Microsoft Windows Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21161
References
Bulletin de sécurité Microsoft Windows CVE-2025-60721 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60707 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59514 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60716 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60717 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60720 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59510 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59509 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62219 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62213 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60708 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60706 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59513 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59506 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59515 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59507 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60714 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62215 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62209 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62208 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60715 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62220 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60723 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60719 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62217 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59512 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62452 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59505 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60724 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60704 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60713 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60710 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60709 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59511 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60703 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59508 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60718 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-60705 2025-11-11 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-62218 2025-11-11 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6575",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8594",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21161",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.7092",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4346",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4346",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Subsystem pour Linux GUI versions ant\u00e9rieures \u00e0 2.6.2",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25768",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.8027",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6575",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6575",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6199",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.8027",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6575",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6575",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25768",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.8027",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.28021",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 25H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26200.7092",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6575",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8594",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.7092",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23624",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23624",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8594",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23624",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22869",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.28021",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.7092",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8594",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1965",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23624",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.7092",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6199",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.8027",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 25H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26200.7092",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21161",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-60714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60714"
    },
    {
      "name": "CVE-2025-62209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62209"
    },
    {
      "name": "CVE-2025-62213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62213"
    },
    {
      "name": "CVE-2025-59507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59507"
    },
    {
      "name": "CVE-2025-60719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60719"
    },
    {
      "name": "CVE-2025-60709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60709"
    },
    {
      "name": "CVE-2025-62217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62217"
    },
    {
      "name": "CVE-2025-59510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59510"
    },
    {
      "name": "CVE-2025-60705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60705"
    },
    {
      "name": "CVE-2025-60716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60716"
    },
    {
      "name": "CVE-2025-62215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62215"
    },
    {
      "name": "CVE-2025-59514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59514"
    },
    {
      "name": "CVE-2025-62452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62452"
    },
    {
      "name": "CVE-2025-60704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60704"
    },
    {
      "name": "CVE-2025-60720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60720"
    },
    {
      "name": "CVE-2025-60724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60724"
    },
    {
      "name": "CVE-2025-60708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60708"
    },
    {
      "name": "CVE-2025-60723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60723"
    },
    {
      "name": "CVE-2025-60706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60706"
    },
    {
      "name": "CVE-2025-60718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60718"
    },
    {
      "name": "CVE-2025-60713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60713"
    },
    {
      "name": "CVE-2025-59505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59505"
    },
    {
      "name": "CVE-2025-59515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59515"
    },
    {
      "name": "CVE-2025-60707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60707"
    },
    {
      "name": "CVE-2025-62220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62220"
    },
    {
      "name": "CVE-2025-59513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59513"
    },
    {
      "name": "CVE-2025-59511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59511"
    },
    {
      "name": "CVE-2025-60715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60715"
    },
    {
      "name": "CVE-2025-62218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62218"
    },
    {
      "name": "CVE-2025-59508",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59508"
    },
    {
      "name": "CVE-2025-60710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60710"
    },
    {
      "name": "CVE-2025-59509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59509"
    },
    {
      "name": "CVE-2025-59506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59506"
    },
    {
      "name": "CVE-2025-62208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62208"
    },
    {
      "name": "CVE-2025-60721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60721"
    },
    {
      "name": "CVE-2025-62219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62219"
    },
    {
      "name": "CVE-2025-60717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60717"
    },
    {
      "name": "CVE-2025-60703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60703"
    },
    {
      "name": "CVE-2025-59512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59512"
    }
  ],
  "initial_release_date": "2025-11-12T00:00:00",
  "last_revision_date": "2025-11-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0996",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-11-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-62215 est activement exploit\u00e9e.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60721",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60721"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60707",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60707"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59514",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59514"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60716",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60716"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60717",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60717"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60720",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60720"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59510",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59510"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59509",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59509"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62219",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62219"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62213",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62213"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60708",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60708"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60706",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60706"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59513",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59513"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59506",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59506"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59515",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59515"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59507",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59507"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60714",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60714"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62215",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62209",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62209"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62208",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62208"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60715",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60715"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62220",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62220"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60723",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60723"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60719",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60719"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62217",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62217"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59512",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59512"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62452",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62452"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59505",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59505"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60724",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60724"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60704",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60704"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60713",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60713"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60710",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60709",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60709"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59511",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59511"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60703",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60703"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59508",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59508"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60718",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60718"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-60705",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60705"
    },
    {
      "published_at": "2025-11-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-62218",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62218"
    }
  ]
}

CERTFR-2025-AVI-0930

Vulnerability from certfr_avis - Published: 2025-10-27 - Updated: 2025-10-27

Une vulnérabilité a été découverte dans Microsoft Windows Server Update Service. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.

L'éditeur a publié un nouveau correctif de sécurité pour cette vulnérabilité qui remplace le correctif précédemment listé dans l'avis CERTFR-2025-AVI-0879.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

La vulnérabilité concerne la fonctionnalité Windows Server Update Service (WSUS) activée sur Windows Server.

Impacted products
Vendor Product Description
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1916
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.4297
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.6905
Microsoft Windows Windows Server 2016 versions antérieures à 10.0.14393.8524
Microsoft Windows Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7922
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22826
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25728
Microsoft Windows Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8524
Microsoft Windows Windows Server 2012 R2 versions antérieures à 6.3.9600.22826
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4297
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6905
Microsoft Windows Windows Server 2019 versions antérieures à 10.0.17763.7922
Microsoft Windows Windows Server 2012 versions antérieures à 6.2.9200.25728
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1916",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4297",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6905",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8524",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7922",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22826",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25728",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8524",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22826",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4297",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6905",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7922",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25728",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "La vuln\u00e9rabilit\u00e9 concerne la fonctionnalit\u00e9 Windows Server Update Service (WSUS) activ\u00e9e sur Windows Server.",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-59287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59287"
    }
  ],
  "initial_release_date": "2025-10-27T00:00:00",
  "last_revision_date": "2025-10-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0930",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows Server Update Service. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n\nL\u0027\u00e9diteur a publi\u00e9 un nouveau correctif de s\u00e9curit\u00e9 pour cette vuln\u00e9rabilit\u00e9 qui remplace le correctif pr\u00e9c\u00e9demment list\u00e9 dans l\u0027avis CERTFR-2025-AVI-0879. ",
  "title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows Server Update Service",
  "vendor_advisories": [
    {
      "published_at": "2025-10-24",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59287",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
    }
  ]
}

CERTFR-2025-AVI-0879

Vulnerability from certfr_avis - Published: 2025-10-15 - Updated: 2025-10-15

De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Microsoft indique que les vulnérabilités CVE-2025-24990, CVE-2025-47827 et CVE-2025-59230 sont activement exploitées.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21161
Microsoft Windows Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8519
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25722
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.000
Microsoft Windows Windows Server 2012 R2 versions antérieures à 6.3.9600.22824
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.4294
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6456
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4294
Microsoft Windows Windows App Client pour Windows Desktop versions antérieures à 2.0.706.0
Microsoft Windows Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6599.0
Microsoft Windows Windows Server 2016 versions antérieures à 10.0.14393.8519
Microsoft Windows Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7919
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6456
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23571
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27974
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6456
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6899
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1913
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23571
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.6899
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6456
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6456
Microsoft Windows Windows 11 Version 25H2 pour systèmes ARM64 versions antérieures à 10.0.26200.6899
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6456
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.6060
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23571
Microsoft Windows Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7919
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.6060
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22824
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6899
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6060
Microsoft Windows Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8519
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6899
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27974
Microsoft Windows Windows Server 2019 versions antérieures à 10.0.17763.7919
Microsoft Windows Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8519
Microsoft Windows Windows Server 2012 versions antérieures à 6.2.9200.25722
Microsoft Windows Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7919
Microsoft Windows Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21161
References
Bulletin de sécurité Microsoft Windows CVE-2025-59205 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55682 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58727 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59204 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59275 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-50175 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55697 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58737 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55326 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-53139 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59502 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55328 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59261 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59214 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58718 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58738 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55687 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59255 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-48004 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59284 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58720 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55688 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55700 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59259 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59196 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55336 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55696 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55685 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55694 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-47827 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59254 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55340 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58722 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55690 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55692 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59184 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59192 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55683 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58731 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-54957 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58714 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55689 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55693 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59194 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59289 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59211 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59197 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58736 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58716 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55333 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59190 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59198 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58729 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-53150 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59202 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58730 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58733 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59200 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55701 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58734 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55698 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-25004 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59209 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59290 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59191 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55332 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55678 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59278 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59242 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55331 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58715 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59230 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-47979 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59188 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59201 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55677 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59244 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58719 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58739 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24052 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58735 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55691 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55676 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55337 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59241 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55335 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59206 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59295 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55681 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55330 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59280 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59258 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59282 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59186 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55699 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24990 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59203 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59260 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55248 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58726 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55684 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59277 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-48813 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59193 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59189 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55339 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58728 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59207 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55338 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59210 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58717 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2016-9535 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58725 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-2884 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-53768 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59287 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59257 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55686 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59185 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55680 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59294 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-49708 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55334 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59187 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-50174 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-53717 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59253 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-58732 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55679 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59195 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-50152 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59199 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55695 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-55325 2025-10-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-59208 2025-10-14 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21161",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8519",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25722",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22824",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4294",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6456",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4294",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.706.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6599.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8519",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7919",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6456",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23571",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27974",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6456",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1913",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23571",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6456",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6456",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 25H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26200.6899",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6456",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.6060",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23571",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7919",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22824",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6899",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6060",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8519",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6899",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27974",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7919",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8519",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25722",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7919",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21161",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-55691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55691"
    },
    {
      "name": "CVE-2025-58738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58738"
    },
    {
      "name": "CVE-2025-58729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58729"
    },
    {
      "name": "CVE-2025-55684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55684"
    },
    {
      "name": "CVE-2025-59197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59197"
    },
    {
      "name": "CVE-2025-55679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55679"
    },
    {
      "name": "CVE-2025-55248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
    },
    {
      "name": "CVE-2025-58719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58719"
    },
    {
      "name": "CVE-2025-59190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59190"
    },
    {
      "name": "CVE-2025-58736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58736"
    },
    {
      "name": "CVE-2025-59254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59254"
    },
    {
      "name": "CVE-2025-59206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59206"
    },
    {
      "name": "CVE-2025-59295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59295"
    },
    {
      "name": "CVE-2025-59287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59287"
    },
    {
      "name": "CVE-2025-55678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55678"
    },
    {
      "name": "CVE-2025-59208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59208"
    },
    {
      "name": "CVE-2025-58731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58731"
    },
    {
      "name": "CVE-2025-55339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55339"
    },
    {
      "name": "CVE-2025-59191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59191"
    },
    {
      "name": "CVE-2025-55676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55676"
    },
    {
      "name": "CVE-2025-58730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58730"
    },
    {
      "name": "CVE-2025-59187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59187"
    },
    {
      "name": "CVE-2025-55685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55685"
    },
    {
      "name": "CVE-2025-59257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59257"
    },
    {
      "name": "CVE-2025-58735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58735"
    },
    {
      "name": "CVE-2025-58717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58717"
    },
    {
      "name": "CVE-2025-59199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59199"
    },
    {
      "name": "CVE-2025-59278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59278"
    },
    {
      "name": "CVE-2025-59198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59198"
    },
    {
      "name": "CVE-2025-58725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58725"
    },
    {
      "name": "CVE-2025-55332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55332"
    },
    {
      "name": "CVE-2025-59230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59230"
    },
    {
      "name": "CVE-2025-55690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55690"
    },
    {
      "name": "CVE-2025-58732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58732"
    },
    {
      "name": "CVE-2025-59194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59194"
    },
    {
      "name": "CVE-2025-59258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59258"
    },
    {
      "name": "CVE-2025-55687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55687"
    },
    {
      "name": "CVE-2025-55335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55335"
    },
    {
      "name": "CVE-2025-53139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53139"
    },
    {
      "name": "CVE-2025-59192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59192"
    },
    {
      "name": "CVE-2025-59255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59255"
    },
    {
      "name": "CVE-2025-58726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58726"
    },
    {
      "name": "CVE-2025-47979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47979"
    },
    {
      "name": "CVE-2025-59186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59186"
    },
    {
      "name": "CVE-2025-58716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58716"
    },
    {
      "name": "CVE-2025-58733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58733"
    },
    {
      "name": "CVE-2025-59201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59201"
    },
    {
      "name": "CVE-2025-58720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58720"
    },
    {
      "name": "CVE-2025-59207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59207"
    },
    {
      "name": "CVE-2025-55333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55333"
    },
    {
      "name": "CVE-2025-59200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59200"
    },
    {
      "name": "CVE-2025-59282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59282"
    },
    {
      "name": "CVE-2025-55682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55682"
    },
    {
      "name": "CVE-2025-55694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55694"
    },
    {
      "name": "CVE-2025-58737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58737"
    },
    {
      "name": "CVE-2025-55331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55331"
    },
    {
      "name": "CVE-2025-59261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59261"
    },
    {
      "name": "CVE-2025-55325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55325"
    },
    {
      "name": "CVE-2025-59259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59259"
    },
    {
      "name": "CVE-2025-55334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55334"
    },
    {
      "name": "CVE-2025-59205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59205"
    },
    {
      "name": "CVE-2025-48813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48813"
    },
    {
      "name": "CVE-2025-48004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48004"
    },
    {
      "name": "CVE-2025-59260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59260"
    },
    {
      "name": "CVE-2025-55688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55688"
    },
    {
      "name": "CVE-2025-55701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55701"
    },
    {
      "name": "CVE-2025-59189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59189"
    },
    {
      "name": "CVE-2025-55330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55330"
    },
    {
      "name": "CVE-2025-55698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55698"
    },
    {
      "name": "CVE-2025-49708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49708"
    },
    {
      "name": "CVE-2025-59195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59195"
    },
    {
      "name": "CVE-2025-50152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50152"
    },
    {
      "name": "CVE-2025-59294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59294"
    },
    {
      "name": "CVE-2025-59214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59214"
    },
    {
      "name": "CVE-2025-55693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55693"
    },
    {
      "name": "CVE-2025-59204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59204"
    },
    {
      "name": "CVE-2025-55336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55336"
    },
    {
      "name": "CVE-2025-24052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24052"
    },
    {
      "name": "CVE-2025-55338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55338"
    },
    {
      "name": "CVE-2025-55692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55692"
    },
    {
      "name": "CVE-2025-55326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55326"
    },
    {
      "name": "CVE-2025-59244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59244"
    },
    {
      "name": "CVE-2025-55696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55696"
    },
    {
      "name": "CVE-2025-59184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59184"
    },
    {
      "name": "CVE-2025-59209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59209"
    },
    {
      "name": "CVE-2025-55686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55686"
    },
    {
      "name": "CVE-2025-47827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47827"
    },
    {
      "name": "CVE-2025-59277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59277"
    },
    {
      "name": "CVE-2025-59253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59253"
    },
    {
      "name": "CVE-2025-50174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50174"
    },
    {
      "name": "CVE-2025-59241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59241"
    },
    {
      "name": "CVE-2025-58728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58728"
    },
    {
      "name": "CVE-2025-53150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53150"
    },
    {
      "name": "CVE-2025-59242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59242"
    },
    {
      "name": "CVE-2025-55677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55677"
    },
    {
      "name": "CVE-2025-59185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59185"
    },
    {
      "name": "CVE-2025-55681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55681"
    },
    {
      "name": "CVE-2025-58718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58718"
    },
    {
      "name": "CVE-2025-55700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55700"
    },
    {
      "name": "CVE-2025-59502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59502"
    },
    {
      "name": "CVE-2025-59275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59275"
    },
    {
      "name": "CVE-2025-59284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59284"
    },
    {
      "name": "CVE-2025-55340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55340"
    },
    {
      "name": "CVE-2025-58734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58734"
    },
    {
      "name": "CVE-2025-55697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55697"
    },
    {
      "name": "CVE-2025-59203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59203"
    },
    {
      "name": "CVE-2025-58715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58715"
    },
    {
      "name": "CVE-2025-55695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55695"
    },
    {
      "name": "CVE-2025-59289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59289"
    },
    {
      "name": "CVE-2025-58714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58714"
    },
    {
      "name": "CVE-2025-25004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25004"
    },
    {
      "name": "CVE-2025-53768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53768"
    },
    {
      "name": "CVE-2025-55699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55699"
    },
    {
      "name": "CVE-2025-50175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50175"
    },
    {
      "name": "CVE-2025-59211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59211"
    },
    {
      "name": "CVE-2025-58739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58739"
    },
    {
      "name": "CVE-2025-59202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59202"
    },
    {
      "name": "CVE-2025-59193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59193"
    },
    {
      "name": "CVE-2025-55683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55683"
    },
    {
      "name": "CVE-2025-59280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59280"
    },
    {
      "name": "CVE-2025-24990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24990"
    },
    {
      "name": "CVE-2025-59210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59210"
    },
    {
      "name": "CVE-2025-58722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58722"
    },
    {
      "name": "CVE-2025-59188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59188"
    },
    {
      "name": "CVE-2025-55689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55689"
    },
    {
      "name": "CVE-2025-58727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58727"
    },
    {
      "name": "CVE-2025-55328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55328"
    },
    {
      "name": "CVE-2025-59290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59290"
    },
    {
      "name": "CVE-2025-55680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55680"
    },
    {
      "name": "CVE-2025-2884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2884"
    },
    {
      "name": "CVE-2025-53717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53717"
    },
    {
      "name": "CVE-2025-59196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59196"
    },
    {
      "name": "CVE-2025-55337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55337"
    },
    {
      "name": "CVE-2016-9535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-9535"
    },
    {
      "name": "CVE-2025-54957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54957"
    }
  ],
  "initial_release_date": "2025-10-15T00:00:00",
  "last_revision_date": "2025-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0879",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2025-24990, CVE-2025-47827 et CVE-2025-59230 sont activement exploit\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59205",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55682",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58727",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59204",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59275",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50175",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55697",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58737",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55326",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53139",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59502",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55328",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59261",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59214",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58718",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58738",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55687",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59255",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48004",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59284",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58720",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55688",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55700",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59259",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59196",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55336",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55696",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55685",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55694",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47827",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59254",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55340",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58722",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55690",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55692",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59184",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59192",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55683",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58731",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-54957",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58714",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55689",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55693",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59194",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59289",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59211",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59197",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58736",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58716",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55333",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59190",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59198",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58729",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53150",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59202",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58730",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58733",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59200",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55701",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58734",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55698",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-25004",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59209",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59290",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59191",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55332",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55678",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59278",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59242",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55331",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58715",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59230",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47979",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59188",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59201",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55677",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59244",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58719",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58739",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24052",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58735",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55691",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55676",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55337",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59241",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55335",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59206",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59295",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55681",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55330",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59280",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59258",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59282",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59186",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55699",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24990",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59203",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59260",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55248",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58726",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55684",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59277",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-48813",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59193",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59189",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55339",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58728",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59207",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55338",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59210",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58717",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2016-9535",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58725",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-2884",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53768",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59287",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59257",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55686",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59185",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55680",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59294",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-49708",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55334",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59187",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50174",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-53717",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59253",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-58732",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55679",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59195",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-50152",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59199",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55695",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55325",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59208",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208"
    }
  ]
}

CERTFR-2025-AVI-0804

Vulnerability from certfr_avis - Published: 2025-09-19 - Updated: 2025-09-19

De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Elles permettent à un attaquant de provoquer une élévation de privilèges.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5909
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.6508
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1849
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6332
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.4106
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19043.6332
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19043.6332
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19043.6332
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19044.6332
Microsoft Windows Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22631.5909
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5909
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6508
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6508
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5909
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6332
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6508
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4106
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1849",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6332",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4106",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19043.6332",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19043.6332",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19043.6332",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6332",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6508",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5909",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6332",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6508",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4106",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-59215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59215"
    },
    {
      "name": "CVE-2025-59216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59216"
    },
    {
      "name": "CVE-2025-59220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59220"
    }
  ],
  "initial_release_date": "2025-09-19T00:00:00",
  "last_revision_date": "2025-09-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0804",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-09-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59215",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59215"
    },
    {
      "published_at": "2025-09-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59216",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59216"
    },
    {
      "published_at": "2025-09-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-59220",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59220"
    }
  ]
}

CERTFR-2025-AVI-0720

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7783
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1840
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.4161
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25669
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6321
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6321
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.6563
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5900
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6321
Microsoft Windows Windows Server 2019 versions antérieures à 10.0.17763.7783
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6321
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6321
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.6563
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27924
Microsoft Windows Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7783
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6321
Microsoft Windows Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7783
Microsoft Windows Windows Server 2012 R2 versions antérieures à 6.3.9600.22767
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.6563
Microsoft Windows Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8416
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5900
Microsoft Windows Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8416
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4161
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23524
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23524
Microsoft Windows Windows Server 2012 versions antérieures à 6.2.9200.25669
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5900
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23524
Microsoft Windows Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21122
Microsoft Windows Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21122
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23524
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.6563
Microsoft Windows Windows Server 2016 versions antérieures à 10.0.14393.8416
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22767
Microsoft Windows Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8416
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27924
Microsoft Windows Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5900
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7783",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1840",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4161",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25669",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6321",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6321",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.6563",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5900",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6321",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7783",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6321",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6321",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.6563",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27924",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7783",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6321",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7783",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22767",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.6563",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8416",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5900",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8416",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4161",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23524",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23524",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25669",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5900",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23524",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21122",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21122",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23524",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.6563",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8416",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22767",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8416",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27924",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5900",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-55230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55230"
    },
    {
      "name": "CVE-2025-55231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55231"
    },
    {
      "name": "CVE-2025-55229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55229"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0720",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55231",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55231"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55230",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55230"
    },
    {
      "published_at": "2025-08-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-55229",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55229"
    }
  ]
}

CERTFR-2025-AVI-0499

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Microsoft indique que la vulnérabilité CVE-2025-33053 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25475
Microsoft Windows Windows Server 2012 R2 versions antérieures à 6.3.9600.22620
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.3981
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1
Microsoft Windows Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5335
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23351
Microsoft Windows Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21034
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.4270
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 1
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27729
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23279
Microsoft Windows Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8066
Microsoft Windows Windows App Client pour Windows Desktop versions antérieures à 2.0.505.0
Microsoft Windows Windows Server 2012 R2 versions antérieures à 1
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5965
Microsoft Windows Windows Server 2019 versions antérieures à 10.0.17763.7314
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5472
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.3630
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22620
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1
Microsoft Windows Windows Server 2016 versions antérieures à 10.0.14393.8148
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1611
Microsoft Windows Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7434
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23279
Microsoft Windows Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21014
Microsoft Windows Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8066
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.4270
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5472
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25522
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.3981
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.3981
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23279
Microsoft Windows Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7314
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23351
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5335
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.4270
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5965
Microsoft Windows Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.21014
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.4270
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5854
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5854
Microsoft Windows Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7434
Microsoft Windows Windows Server 2012 versions antérieures à 6.2.9200.25475
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23351
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5854
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5335
Microsoft Windows Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7314
Microsoft Windows Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6278.0
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1665
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3630
Microsoft Windows Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8148
Microsoft Windows Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.21034
Microsoft Windows Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8148
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1
Microsoft Windows Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8066
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.3745
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5965
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.3981
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5965
Microsoft Windows Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7434
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23351
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5335
Microsoft Windows Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8148
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22621.5335
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27769
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5854
Microsoft Windows Windows Server 2019 versions antérieures à 10.0.17763.7434
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5854
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22577
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5965
Microsoft Windows Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5472
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1
Microsoft Windows Windows SDK versions antérieures à 10.0.26100.4188
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5854
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27769
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5965
Microsoft Windows Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7314
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3745
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 1
Microsoft Windows Windows Server 2012 versions antérieures à 6.2.9200.25522
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23279
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5335
Microsoft Windows Windows Security App versions antérieures à 1000.27840.0.1000
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27729
Microsoft Windows Windows Server 2012 versions antérieures à 1
Microsoft Windows Windows Server 2012 R2 versions antérieures à 6.3.9600.22577
Microsoft Windows Windows Server 2016 versions antérieures à 10.0.14393.8066
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.5472
References
Bulletin de sécurité Microsoft Windows CVE-2025-32722 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32721 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-47969 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32712 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33056 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33060 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33059 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33061 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33062 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33067 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24069 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33075 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33071 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24068 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33068 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33053 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33050 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-47955 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32720 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24065 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-47962 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32718 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33052 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32724 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-3052 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33057 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32710 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32713 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32716 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33073 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-47160 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32725 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-29828 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33069 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33058 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33065 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32715 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33064 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33063 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33055 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33066 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-47956 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32719 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-32714 2025-06-10 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-33070 2025-06-10 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25475",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22620",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23351",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21034",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.4270",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27729",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23279",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8066",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.505.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5965",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7314",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5472",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3630",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22620",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8148",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1611",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7434",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23279",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21014",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8066",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.4270",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5472",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25522",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.3981",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23279",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7314",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23351",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5335",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.4270",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5965",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.21014",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.4270",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5854",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5854",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7434",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25475",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23351",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5854",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5335",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7314",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6278.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1665",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3630",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8148",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.21034",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8148",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8066",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3745",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5965",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.3981",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5965",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7434",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23351",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8148",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27769",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5854",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7434",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5854",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22577",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5965",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5472",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows SDK versions ant\u00e9rieures \u00e0 10.0.26100.4188",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5854",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27769",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5965",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7314",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3745",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25522",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23279",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5335",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Security App versions ant\u00e9rieures \u00e0 1000.27840.0.1000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27729",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22577",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8066",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.5472",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-33073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33073"
    },
    {
      "name": "CVE-2025-24068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24068"
    },
    {
      "name": "CVE-2025-33071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33071"
    },
    {
      "name": "CVE-2025-33061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33061"
    },
    {
      "name": "CVE-2025-32720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32720"
    },
    {
      "name": "CVE-2025-32713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32713"
    },
    {
      "name": "CVE-2025-33067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33067"
    },
    {
      "name": "CVE-2025-47160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47160"
    },
    {
      "name": "CVE-2025-33068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33068"
    },
    {
      "name": "CVE-2025-33055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33055"
    },
    {
      "name": "CVE-2025-33065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33065"
    },
    {
      "name": "CVE-2025-32712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32712"
    },
    {
      "name": "CVE-2025-47956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47956"
    },
    {
      "name": "CVE-2025-32715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32715"
    },
    {
      "name": "CVE-2025-33069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33069"
    },
    {
      "name": "CVE-2025-47955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47955"
    },
    {
      "name": "CVE-2025-33053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33053"
    },
    {
      "name": "CVE-2025-33070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33070"
    },
    {
      "name": "CVE-2025-32721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32721"
    },
    {
      "name": "CVE-2025-33062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33062"
    },
    {
      "name": "CVE-2025-32722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32722"
    },
    {
      "name": "CVE-2025-33052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33052"
    },
    {
      "name": "CVE-2025-32725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32725"
    },
    {
      "name": "CVE-2025-32710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32710"
    },
    {
      "name": "CVE-2025-47962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47962"
    },
    {
      "name": "CVE-2025-24065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24065"
    },
    {
      "name": "CVE-2025-33075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33075"
    },
    {
      "name": "CVE-2025-33059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33059"
    },
    {
      "name": "CVE-2025-33064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33064"
    },
    {
      "name": "CVE-2025-29828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29828"
    },
    {
      "name": "CVE-2025-32724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32724"
    },
    {
      "name": "CVE-2025-33056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33056"
    },
    {
      "name": "CVE-2025-33057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33057"
    },
    {
      "name": "CVE-2025-33063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33063"
    },
    {
      "name": "CVE-2025-47969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47969"
    },
    {
      "name": "CVE-2025-32718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32718"
    },
    {
      "name": "CVE-2025-32714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32714"
    },
    {
      "name": "CVE-2025-32719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32719"
    },
    {
      "name": "CVE-2025-33058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33058"
    },
    {
      "name": "CVE-2025-33060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33060"
    },
    {
      "name": "CVE-2025-33050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33050"
    },
    {
      "name": "CVE-2025-33066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33066"
    },
    {
      "name": "CVE-2025-32716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32716"
    },
    {
      "name": "CVE-2025-3052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3052"
    },
    {
      "name": "CVE-2025-24069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24069"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0499",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-33053 est activement exploit\u00e9e.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32722",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32722"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32721",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32721"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47969",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47969"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32712",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32712"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33056",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33056"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33060",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33060"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33059",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33059"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33061",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33061"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33062",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33062"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33067",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33067"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24069",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24069"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33075",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33075"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33071",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33071"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24068",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24068"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33068",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33068"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33053",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33050",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33050"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47955",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47955"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32720",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32720"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24065",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24065"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47962",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47962"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32718",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32718"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33052",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33052"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32724",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32724"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-3052",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3052"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33057",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33057"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32710",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32710"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32713",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32713"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32716",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32716"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33073",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47160",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47160"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32725",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32725"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29828",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29828"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33069",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33069"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33058",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33058"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33065",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33065"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32715",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32715"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33064",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33064"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33063",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33063"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33055",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33055"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33066",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33066"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-47956",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47956"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32719",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32719"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-32714",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32714"
    },
    {
      "published_at": "2025-06-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-33070",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33070"
    }
  ]
}

CERTFR-2025-AVI-0288

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Microsoft indique que la vulnérabilité CVE-2025-29824 est activement exploitée.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7970
Microsoft Windows Windows 10 pour systèmes x64
Microsoft Windows Windows Server 2019 versions antérieures à 10.0.17763.7137
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5737
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.000
Microsoft Windows Windows Server 2012 R2 versions antérieures à 6.3.9600.22523
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.3775
Microsoft Windows Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.7137
Microsoft Windows Windows Server 2016 versions antérieures à 10.0.14393.7970
Microsoft Windows Windows App Client pour Windows Desktop versions antérieures à 2.0.379.0
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.000
Microsoft Windows Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.5191
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.000
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5737
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.000
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.3775
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.3775
Microsoft Windows Remote Desktop client pour Windows Desktop versions antérieures à 1.2.6081.0
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23220
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23220
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.000
Microsoft Windows Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7970
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.000
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 1.000
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.000
Microsoft Windows Windows Admin Center versions antérieures à 2.4.2.1
Microsoft Windows Windows Admin Center in Azure Portal versions antérieures à 0.45.0.0
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.5191
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23220
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5191
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25423
Microsoft Windows Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7970
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.3454
Microsoft Windows Windows Server 2012 R2 versions antérieures à 1.000
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3454
Microsoft Windows Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.7137
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5737
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27670
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5737
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23220
Microsoft Windows Windows Server 2012 versions antérieures à 1.000
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27670
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22523
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5737
Microsoft Windows Windows Server 2012 versions antérieures à 6.2.9200.25423
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5737
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.3775
Microsoft Windows Windows 10 pour systèmes 32 bits
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1551
Microsoft Windows Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.7137
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22621.5191
References
Bulletin de sécurité Microsoft Windows CVE-2025-26637 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27492 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27478 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27480 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27483 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21203 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26647 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27467 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27469 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27479 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21191 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26668 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26672 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27486 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26665 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27736 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21197 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27485 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24073 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26678 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26669 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24074 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26687 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27474 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27731 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27727 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27491 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27481 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21204 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26680 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26681 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27484 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27476 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27737 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27729 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27733 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26671 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26676 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26686 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24060 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26663 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-29810 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26667 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27739 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26688 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-29811 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26651 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27471 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21221 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26664 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27741 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26649 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26679 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27728 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24062 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-24058 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21174 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26640 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27472 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-29809 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21222 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-29819 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27473 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26641 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26648 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27738 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26652 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27490 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26674 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26644 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27470 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-29824 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26666 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26635 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27742 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26673 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26670 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27477 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27475 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27732 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27740 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-29812 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21205 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-29808 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27482 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27487 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27735 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26675 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-26639 2025-04-08 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-27730 2025-04-08 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7970",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes x64",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.7137",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22523",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.3775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.7137",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7970",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows App Client pour Windows Desktop versions ant\u00e9rieures \u00e0 2.0.379.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Remote Desktop client pour Windows Desktop versions ant\u00e9rieures \u00e0 1.2.6081.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23220",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23220",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7970",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Admin Center versions ant\u00e9rieures \u00e0 2.4.2.1",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Admin Center in Azure Portal versions ant\u00e9rieures \u00e0 0.45.0.0",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.5191",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23220",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25423",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7970",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3454",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3454",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.7137",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27670",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23220",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1.000",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27670",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22523",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25423",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5737",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.3775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes 32 bits",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1551",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.7137",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.5191",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-26641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26641"
    },
    {
      "name": "CVE-2025-21221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21221"
    },
    {
      "name": "CVE-2025-26670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26670"
    },
    {
      "name": "CVE-2025-26669",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26669"
    },
    {
      "name": "CVE-2025-26666",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26666"
    },
    {
      "name": "CVE-2025-26647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26647"
    },
    {
      "name": "CVE-2025-26680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26680"
    },
    {
      "name": "CVE-2025-26668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26668"
    },
    {
      "name": "CVE-2025-26672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26672"
    },
    {
      "name": "CVE-2025-21191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21191"
    },
    {
      "name": "CVE-2025-27482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27482"
    },
    {
      "name": "CVE-2025-27469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27469"
    },
    {
      "name": "CVE-2025-26676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26676"
    },
    {
      "name": "CVE-2025-27737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27737"
    },
    {
      "name": "CVE-2025-26688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26688"
    },
    {
      "name": "CVE-2025-21174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21174"
    },
    {
      "name": "CVE-2025-27474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27474"
    },
    {
      "name": "CVE-2025-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26686"
    },
    {
      "name": "CVE-2025-26667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26667"
    },
    {
      "name": "CVE-2025-26674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26674"
    },
    {
      "name": "CVE-2025-24058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24058"
    },
    {
      "name": "CVE-2025-26648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26648"
    },
    {
      "name": "CVE-2025-27735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27735"
    },
    {
      "name": "CVE-2025-26673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26673"
    },
    {
      "name": "CVE-2025-27471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27471"
    },
    {
      "name": "CVE-2025-27492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27492"
    },
    {
      "name": "CVE-2025-27470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27470"
    },
    {
      "name": "CVE-2025-27472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27472"
    },
    {
      "name": "CVE-2025-26639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26639"
    },
    {
      "name": "CVE-2025-26637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26637"
    },
    {
      "name": "CVE-2025-21203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21203"
    },
    {
      "name": "CVE-2025-26644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26644"
    },
    {
      "name": "CVE-2025-29810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29810"
    },
    {
      "name": "CVE-2025-27485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27485"
    },
    {
      "name": "CVE-2025-29808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29808"
    },
    {
      "name": "CVE-2025-27732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27732"
    },
    {
      "name": "CVE-2025-27479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27479"
    },
    {
      "name": "CVE-2025-21205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21205"
    },
    {
      "name": "CVE-2025-27739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27739"
    },
    {
      "name": "CVE-2025-27491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27491"
    },
    {
      "name": "CVE-2025-27480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27480"
    },
    {
      "name": "CVE-2025-27484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27484"
    },
    {
      "name": "CVE-2025-26665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26665"
    },
    {
      "name": "CVE-2025-27475",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27475"
    },
    {
      "name": "CVE-2025-24060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24060"
    },
    {
      "name": "CVE-2025-27483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27483"
    },
    {
      "name": "CVE-2025-27738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27738"
    },
    {
      "name": "CVE-2025-27731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27731"
    },
    {
      "name": "CVE-2025-27476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27476"
    },
    {
      "name": "CVE-2025-29812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29812"
    },
    {
      "name": "CVE-2025-27728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27728"
    },
    {
      "name": "CVE-2025-27733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27733"
    },
    {
      "name": "CVE-2025-27729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27729"
    },
    {
      "name": "CVE-2025-21204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21204"
    },
    {
      "name": "CVE-2025-24062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24062"
    },
    {
      "name": "CVE-2025-27740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27740"
    },
    {
      "name": "CVE-2025-24073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24073"
    },
    {
      "name": "CVE-2025-26649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26649"
    },
    {
      "name": "CVE-2025-27741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27741"
    },
    {
      "name": "CVE-2025-27481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27481"
    },
    {
      "name": "CVE-2025-26651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26651"
    },
    {
      "name": "CVE-2025-27486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27486"
    },
    {
      "name": "CVE-2025-24074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24074"
    },
    {
      "name": "CVE-2025-21222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21222"
    },
    {
      "name": "CVE-2025-26671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26671"
    },
    {
      "name": "CVE-2025-29819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29819"
    },
    {
      "name": "CVE-2025-26663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26663"
    },
    {
      "name": "CVE-2025-27473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27473"
    },
    {
      "name": "CVE-2025-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29824"
    },
    {
      "name": "CVE-2025-26652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26652"
    },
    {
      "name": "CVE-2025-27736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27736"
    },
    {
      "name": "CVE-2025-27467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27467"
    },
    {
      "name": "CVE-2025-27487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27487"
    },
    {
      "name": "CVE-2025-26664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26664"
    },
    {
      "name": "CVE-2025-26678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26678"
    },
    {
      "name": "CVE-2025-26635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26635"
    },
    {
      "name": "CVE-2025-26681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26681"
    },
    {
      "name": "CVE-2025-27477",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27477"
    },
    {
      "name": "CVE-2025-26675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26675"
    },
    {
      "name": "CVE-2025-27490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27490"
    },
    {
      "name": "CVE-2025-26687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26687"
    },
    {
      "name": "CVE-2025-27730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27730"
    },
    {
      "name": "CVE-2025-27742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27742"
    },
    {
      "name": "CVE-2025-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21197"
    },
    {
      "name": "CVE-2025-27727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27727"
    },
    {
      "name": "CVE-2025-26679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26679"
    },
    {
      "name": "CVE-2025-26640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26640"
    },
    {
      "name": "CVE-2025-29809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29809"
    },
    {
      "name": "CVE-2025-27478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27478"
    },
    {
      "name": "CVE-2025-29811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29811"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0288",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2025-29824 est activement exploit\u00e9e.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26637",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26637"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27492",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27492"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27478",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27478"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27480",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27480"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27483",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27483"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21203",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21203"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26647",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26647"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27467",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27467"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27469",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27469"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27479",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27479"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21191",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21191"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26668",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26668"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26672",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26672"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27486",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27486"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26665",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26665"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27736",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27736"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21197",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21197"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27485",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27485"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24073",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24073"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26678",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26678"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26669",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26669"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24074",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24074"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26687",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26687"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27474",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27474"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27731",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27731"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27727",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27727"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27491",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27491"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27481",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27481"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21204",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21204"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26680",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26680"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26681",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26681"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27484",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27484"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27476",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27476"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27737",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27737"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27729",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27733",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27733"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26671",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26671"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26676",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26676"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26686",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26686"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24060",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24060"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26663",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26663"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29810",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29810"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26667",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26667"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27739",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27739"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26688",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26688"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29811",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29811"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26651",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26651"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27471",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27471"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21221",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21221"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26664",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26664"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27741",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27741"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26649",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26649"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26679",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26679"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27728",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27728"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24062",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24062"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-24058",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24058"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21174",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21174"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26640",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26640"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27472",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27472"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29809",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29809"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21222",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21222"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29819",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29819"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27473",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27473"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26641",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26641"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26648",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26648"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27738",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27738"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26652",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26652"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27490",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27490"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26674",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26674"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26644",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26644"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27470",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27470"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29824",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26666",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26666"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26635",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27742",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27742"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26673",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26673"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26670",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26670"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27477",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27477"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27475",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27475"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27732",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27732"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27740",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27740"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29812",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29812"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21205",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21205"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-29808",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29808"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27482",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27482"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27487",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27487"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27735",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27735"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26675",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26675"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-26639",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26639"
    },
    {
      "published_at": "2025-04-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-27730",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27730"
    }
  ]
}

CERTFR-2025-AVI-0048

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité a été découverte dans Microsoft Windows. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.2894
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5371
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.2894
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.2894
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5371
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4751
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5371
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5371
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.4751
Microsoft Windows Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.4751
Microsoft Windows Windows Server 2025 (Server Core installation)
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5371
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.4751
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5371
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.4751",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation)",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.4751",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-21325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21325"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0048",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-01-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Windows. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-01-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21325",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21325"
    }
  ]
}

CERTFR-2025-AVI-0039

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Microsoft indique que les vulnérabilités CVE-2025-21333, CVE-2025-21334 et CVE-2025-21335 sont activement exploitées.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22371
Microsoft Windows Windows Server 2025 versions antérieures à 10.0.26100.2894
Microsoft Windows Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.2894
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23070
Microsoft Windows Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.6775
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.007
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25273
Microsoft Windows Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.5371
Microsoft Windows Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7699
Microsoft Windows Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7699
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 1.007
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 1.007
Microsoft Windows Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.2894
Microsoft Windows Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23070
Microsoft Windows Windows Server 2019 versions antérieures à 10.0.17763.6775
Microsoft Windows Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.6775
Microsoft Windows Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.2894
Microsoft Windows Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.5371
Microsoft Windows Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4751
Microsoft Windows Windows Server 2012 versions antérieures à 1.003
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23070
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.007
Microsoft Windows Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.3091
Microsoft Windows Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4751
Microsoft Windows Windows Server 2012 (Server Core installation) versions antérieures à 1.003
Microsoft Windows Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.6775
Microsoft Windows Windows Server 2012 R2 versions antérieures à 1.002
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.003
Microsoft Windows Windows Server 2022 versions antérieures à 10.0.20348.3091
Microsoft Windows Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.5371
Microsoft Windows Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.5371
Microsoft Windows Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.4751
Microsoft Windows Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.4751
Microsoft Windows Windows Server 2012 versions antérieures à 6.2.9200.25273
Microsoft Windows Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1369
Microsoft Windows Windows Server 2016 versions antérieures à 10.0.14393.7699
Microsoft Windows Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20890
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27520
Microsoft Windows Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.5371
Microsoft Windows Windows Server 2012 R2 (Server Core installation) versions antérieures à 1.002
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27520
Microsoft Windows Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7699
Microsoft Windows Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.003
Microsoft Windows Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23070
Microsoft Windows Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20890
Microsoft Windows Windows Server 2012 R2 versions antérieures à 6.3.9600.22371
Microsoft Windows Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.5371
References
Bulletin de sécurité Microsoft Windows CVE-2025-21249 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21244 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21300 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21276 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21340 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21189 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21287 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21277 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21382 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21248 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21295 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21310 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21246 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21255 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21218 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21294 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21250 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21321 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21305 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21220 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21260 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21338 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21214 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21223 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21171 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21372 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21304 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21241 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21252 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21327 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21299 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21323 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21378 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21411 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21258 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21275 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21281 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21282 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21302 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21202 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21314 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21239 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21224 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21290 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21228 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21242 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2024-7344 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21176 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21225 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21284 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21330 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21318 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21409 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21331 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21232 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21263 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21272 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21413 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21293 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21193 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21236 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21296 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21234 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21341 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21285 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21213 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21243 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21308 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21312 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21245 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21233 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21251 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21207 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21227 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21237 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21215 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21374 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21315 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21333 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21339 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21326 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21269 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21288 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21343 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21257 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21271 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21306 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21389 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21370 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21291 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21270 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21229 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21266 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21324 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21238 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21289 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21301 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21311 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21336 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21217 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21317 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21329 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21332 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21273 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21256 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21328 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21230 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21335 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21231 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21240 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21292 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21334 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21226 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21261 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21297 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21319 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21303 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21417 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21235 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21274 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21211 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21210 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21320 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21313 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21172 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21219 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21268 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21307 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21286 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21278 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21280 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21298 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21316 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21265 2025-01-14 vendor-advisory
Bulletin de sécurité Microsoft Windows CVE-2025-21309 2025-01-14 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.2894",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23070",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.6775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.007",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25273",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7699",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7699",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.007",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.007",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23070",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.6775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.6775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.2894",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1.003",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23070",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.007",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.3091",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.6775",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.002",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.003",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.3091",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.4751",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.4751",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25273",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1369",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7699",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20890",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27520",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 1.002",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27520",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7699",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.003",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23070",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20890",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    },
    {
      "description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.5371",
      "product": {
        "name": "Windows",
        "vendor": {
          "name": "Microsoft",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-21220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21220"
    },
    {
      "name": "CVE-2025-21245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21245"
    },
    {
      "name": "CVE-2025-21231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21231"
    },
    {
      "name": "CVE-2025-21242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21242"
    },
    {
      "name": "CVE-2025-21285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21285"
    },
    {
      "name": "CVE-2025-21413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21413"
    },
    {
      "name": "CVE-2025-21334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21334"
    },
    {
      "name": "CVE-2025-21296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21296"
    },
    {
      "name": "CVE-2025-21223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21223"
    },
    {
      "name": "CVE-2025-21321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21321"
    },
    {
      "name": "CVE-2025-21331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21331"
    },
    {
      "name": "CVE-2025-21248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21248"
    },
    {
      "name": "CVE-2025-21278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21278"
    },
    {
      "name": "CVE-2025-21303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21303"
    },
    {
      "name": "CVE-2025-21326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21326"
    },
    {
      "name": "CVE-2025-21210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21210"
    },
    {
      "name": "CVE-2025-21218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21218"
    },
    {
      "name": "CVE-2025-21251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21251"
    },
    {
      "name": "CVE-2025-21372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21372"
    },
    {
      "name": "CVE-2025-21323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21323"
    },
    {
      "name": "CVE-2025-21240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21240"
    },
    {
      "name": "CVE-2025-21317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21317"
    },
    {
      "name": "CVE-2025-21318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21318"
    },
    {
      "name": "CVE-2025-21176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21176"
    },
    {
      "name": "CVE-2025-21374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21374"
    },
    {
      "name": "CVE-2025-21389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21389"
    },
    {
      "name": "CVE-2025-21263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21263"
    },
    {
      "name": "CVE-2025-21315",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21315"
    },
    {
      "name": "CVE-2025-21319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21319"
    },
    {
      "name": "CVE-2025-21280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21280"
    },
    {
      "name": "CVE-2025-21298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21298"
    },
    {
      "name": "CVE-2025-21239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21239"
    },
    {
      "name": "CVE-2024-7344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7344"
    },
    {
      "name": "CVE-2025-21266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21266"
    },
    {
      "name": "CVE-2025-21332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21332"
    },
    {
      "name": "CVE-2025-21274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21274"
    },
    {
      "name": "CVE-2025-21249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21249"
    },
    {
      "name": "CVE-2025-21189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21189"
    },
    {
      "name": "CVE-2025-21301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21301"
    },
    {
      "name": "CVE-2025-21309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21309"
    },
    {
      "name": "CVE-2025-21268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21268"
    },
    {
      "name": "CVE-2025-21310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21310"
    },
    {
      "name": "CVE-2025-21290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21290"
    },
    {
      "name": "CVE-2025-21287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21287"
    },
    {
      "name": "CVE-2025-21234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21234"
    },
    {
      "name": "CVE-2025-21417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21417"
    },
    {
      "name": "CVE-2025-21171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21171"
    },
    {
      "name": "CVE-2025-21293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21293"
    },
    {
      "name": "CVE-2025-21275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21275"
    },
    {
      "name": "CVE-2025-21225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21225"
    },
    {
      "name": "CVE-2025-21244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21244"
    },
    {
      "name": "CVE-2025-21228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21228"
    },
    {
      "name": "CVE-2025-21271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21271"
    },
    {
      "name": "CVE-2025-21307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21307"
    },
    {
      "name": "CVE-2025-21316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21316"
    },
    {
      "name": "CVE-2025-21255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21255"
    },
    {
      "name": "CVE-2025-21378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21378"
    },
    {
      "name": "CVE-2025-21299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21299"
    },
    {
      "name": "CVE-2025-21330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21330"
    },
    {
      "name": "CVE-2025-21224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21224"
    },
    {
      "name": "CVE-2025-21211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21211"
    },
    {
      "name": "CVE-2025-21235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21235"
    },
    {
      "name": "CVE-2025-21277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21277"
    },
    {
      "name": "CVE-2025-21270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21270"
    },
    {
      "name": "CVE-2025-21339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21339"
    },
    {
      "name": "CVE-2025-21333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21333"
    },
    {
      "name": "CVE-2025-21257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21257"
    },
    {
      "name": "CVE-2025-21370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21370"
    },
    {
      "name": "CVE-2025-21227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21227"
    },
    {
      "name": "CVE-2025-21324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21324"
    },
    {
      "name": "CVE-2025-21256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21256"
    },
    {
      "name": "CVE-2025-21304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21304"
    },
    {
      "name": "CVE-2025-21215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21215"
    },
    {
      "name": "CVE-2025-21327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21327"
    },
    {
      "name": "CVE-2025-21236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21236"
    },
    {
      "name": "CVE-2025-21202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21202"
    },
    {
      "name": "CVE-2025-21214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21214"
    },
    {
      "name": "CVE-2025-21273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21273"
    },
    {
      "name": "CVE-2025-21311",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21311"
    },
    {
      "name": "CVE-2025-21243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21243"
    },
    {
      "name": "CVE-2025-21297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21297"
    },
    {
      "name": "CVE-2025-21213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21213"
    },
    {
      "name": "CVE-2025-21291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21291"
    },
    {
      "name": "CVE-2025-21276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21276"
    },
    {
      "name": "CVE-2025-21260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21260"
    },
    {
      "name": "CVE-2025-21320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21320"
    },
    {
      "name": "CVE-2025-21258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21258"
    },
    {
      "name": "CVE-2025-21411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21411"
    },
    {
      "name": "CVE-2025-21292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21292"
    },
    {
      "name": "CVE-2025-21281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21281"
    },
    {
      "name": "CVE-2025-21238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21238"
    },
    {
      "name": "CVE-2025-21284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21284"
    },
    {
      "name": "CVE-2025-21229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21229"
    },
    {
      "name": "CVE-2025-21306",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21306"
    },
    {
      "name": "CVE-2025-21336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21336"
    },
    {
      "name": "CVE-2025-21338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21338"
    },
    {
      "name": "CVE-2025-21313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21313"
    },
    {
      "name": "CVE-2025-21343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21343"
    },
    {
      "name": "CVE-2025-21329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21329"
    },
    {
      "name": "CVE-2025-21335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21335"
    },
    {
      "name": "CVE-2025-21302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21302"
    },
    {
      "name": "CVE-2025-21314",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21314"
    },
    {
      "name": "CVE-2025-21207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21207"
    },
    {
      "name": "CVE-2025-21289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21289"
    },
    {
      "name": "CVE-2025-21272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21272"
    },
    {
      "name": "CVE-2025-21288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21288"
    },
    {
      "name": "CVE-2025-21246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21246"
    },
    {
      "name": "CVE-2025-21193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21193"
    },
    {
      "name": "CVE-2025-21219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21219"
    },
    {
      "name": "CVE-2025-21409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21409"
    },
    {
      "name": "CVE-2025-21252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21252"
    },
    {
      "name": "CVE-2025-21269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21269"
    },
    {
      "name": "CVE-2025-21382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21382"
    },
    {
      "name": "CVE-2025-21282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21282"
    },
    {
      "name": "CVE-2025-21294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21294"
    },
    {
      "name": "CVE-2025-21217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21217"
    },
    {
      "name": "CVE-2025-21237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21237"
    },
    {
      "name": "CVE-2025-21328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21328"
    },
    {
      "name": "CVE-2025-21305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21305"
    },
    {
      "name": "CVE-2025-21233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21233"
    },
    {
      "name": "CVE-2025-21286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21286"
    },
    {
      "name": "CVE-2025-21261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21261"
    },
    {
      "name": "CVE-2025-21300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21300"
    },
    {
      "name": "CVE-2025-21232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21232"
    },
    {
      "name": "CVE-2025-21172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21172"
    },
    {
      "name": "CVE-2025-21226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21226"
    },
    {
      "name": "CVE-2025-21295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21295"
    },
    {
      "name": "CVE-2025-21250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21250"
    },
    {
      "name": "CVE-2025-21230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21230"
    },
    {
      "name": "CVE-2025-21340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21340"
    },
    {
      "name": "CVE-2025-21265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21265"
    },
    {
      "name": "CVE-2025-21341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21341"
    },
    {
      "name": "CVE-2025-21241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21241"
    },
    {
      "name": "CVE-2025-21312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21312"
    },
    {
      "name": "CVE-2025-21308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21308"
    }
  ],
  "links": [],
  "reference": "CERTFR-2025-AVI-0039",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-01-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2025-21333, CVE-2025-21334 et CVE-2025-21335 sont activement exploit\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
  "vendor_advisories": [
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21249",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21249"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21244",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21244"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21300",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21300"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21276",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21340",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21340"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21189",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21287",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21287"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21277",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21382",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21382"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21248",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21248"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21295",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21295"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21310",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21310"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21246",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21246"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21255",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21218",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21218"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21294",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21294"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21250",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21250"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21321",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21321"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21305",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21305"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21220",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21260",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21338",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21338"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21214",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21223",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21171",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21372",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21372"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21304",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21304"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21241",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21241"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21252",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21252"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21327",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21327"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21299",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21299"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21323",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21323"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21378",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21378"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21411",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21411"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21258",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21275",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21281",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21282",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21302",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21302"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21202",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21202"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21314",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21239",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21239"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21224",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21224"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21290",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21290"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21228",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21242",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21242"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-7344",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-7344"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21176",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21225",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21225"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21284",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21284"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21330",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21330"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21318",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21318"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21409",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21409"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21331",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21331"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21232",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21232"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21263",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21272",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21413",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21413"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21293",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21293"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21193",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21193"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21236",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21236"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21296",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21296"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21234",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21234"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21341",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21341"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21285",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21285"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21213",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21213"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21243",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21243"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21308",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21312",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21312"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21245",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21245"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21233",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21233"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21251",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21251"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21207",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21207"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21227",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21237",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21237"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21215",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21374",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21374"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21315",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21315"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21333",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21339",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21339"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21326",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21326"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21269",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21288",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21288"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21343",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21343"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21257",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21257"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21271",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21271"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21306",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21306"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21389",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21389"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21370",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21370"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21291",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21291"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21270",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21229",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21229"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21266",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21324",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21324"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21238",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21238"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21289",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21301",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21301"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21311",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21311"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21336",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21336"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21217",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21317",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21317"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21329",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21329"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21332",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21332"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21273",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21256",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21328",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21328"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21230",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21335",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21231",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21240",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21240"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21292",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21292"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21334",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21226",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21261",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21297",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21297"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21319",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21319"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21303",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21303"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21417",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21417"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21235",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21235"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21274",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21274"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21211",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21211"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21210",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21320",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21320"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21313",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21172",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21219",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21268",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21307",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21286",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21286"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21278",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21278"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21280",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21280"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21298",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21298"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21316",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21316"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21265",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265"
    },
    {
      "published_at": "2025-01-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2025-21309",
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21309"
    }
  ]
}

CVE-2022-50238 (GCVE-0-2022-50238)

Vulnerability from cvelistv5 – Published: 2025-09-08 00:00 – Updated: 2025-11-17 16:01
VLAI?
Summary
The on-endpoint Microsoft vulnerable driver blocklist is not fully synchronized with the online Microsoft recommended driver block rules. Some entries present on the online list have been excluded from the on-endpoint blocklist longer than the expected periodic monthly Windows updates. It is possible to fully synchronize the driver blocklist using WDAC policies. NOTE: The vendor explains that Windows Update provides a smaller, compatibility-focused driver blocklist for general users, while the full XML list is available for advanced users and organizations to customize at the risk of usability issues.
CWE
  • CWE-820 - Missing Synchronization
Assigner
Impacted products
Vendor Product Version
Microsoft Windows Affected: 10 , ≤ Server 2025 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-50238",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-30T01:13:02.958357Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-184",
                "description": "CWE-184 Incomplete List of Disallowed Inputs",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-17T16:01:40.773Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "Server 2025",
              "status": "affected",
              "version": "10",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The on-endpoint Microsoft vulnerable driver blocklist is not fully synchronized with the online Microsoft recommended driver block rules. Some entries present on the online list have been excluded from the on-endpoint blocklist longer than the expected periodic monthly Windows updates. It is possible to fully synchronize the driver blocklist using WDAC policies. NOTE: The vendor explains that Windows Update provides a smaller, compatibility-focused driver blocklist for general users, while the full XML list is available for advanced users and organizations to customize at the risk of usability issues."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-820",
              "description": "CWE-820 Missing Synchronization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-17T18:55:11.829Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/wdormann/applywdac"
        },
        {
          "url": "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-50238",
    "datePublished": "2025-09-08T00:00:00.000Z",
    "dateReserved": "2025-09-08T00:00:00.000Z",
    "dateUpdated": "2025-11-17T16:01:40.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-59033 (GCVE-0-2025-59033)

Vulnerability from cvelistv5 – Published: 2025-09-08 00:00 – Updated: 2025-11-17 15:57
VLAI?
Summary
The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. Entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate's TBS hash along with a 'FileAttribRef' qualifier (such as file name or version) may not be blocked, whether hypervisor-protected code integrity (HVCI) is enabled or not. NOTE: The vendor disputes this CVE ID assignment and states that the driver blocklist is intended for use with HVCI.
CWE
  • CWE-420 - Unprotected Alternate Channel
Assigner
Impacted products
Vendor Product Version
Microsoft Windows Affected: 10 , ≤ Server 2025 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-59033",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-30T01:13:45.514218Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-17T15:57:52.240Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "Server 2025",
              "status": "affected",
              "version": "10",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. Entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate\u0027s TBS hash along with a \u0027FileAttribRef\u0027 qualifier (such as file name or version) may not be blocked, whether hypervisor-protected code integrity (HVCI) is enabled or not. NOTE: The vendor disputes this CVE ID assignment and states that the driver blocklist is intended for use with HVCI."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-420",
              "description": "CWE-420 Unprotected Alternate Channel",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-14T13:41:51.271Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules"
        },
        {
          "url": "https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity"
        },
        {
          "url": "https://x.com/JonnyJohnson_/status/1895103112924307727"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-59033",
    "datePublished": "2025-09-08T00:00:00.000Z",
    "dateReserved": "2025-09-08T00:00:00.000Z",
    "dateUpdated": "2025-11-17T15:57:52.240Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-9491 (GCVE-0-2025-9491)

Vulnerability from cvelistv5 – Published: 2025-08-26 16:25 – Updated: 2025-12-05 16:28
VLAI?
Summary
Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.
CWE
  • CWE-451 - User Interface (UI) Misrepresentation of Critical Information
Assigner
zdi
References
Impacted products
Vendor Product Version
Microsoft Windows Affected: 11 Enterprise 23H2 22631.4169 x64
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "descriptions": [
          {
            "lang": "en",
            "value": "In Windows 11 25H2 the .LNK file properties user interface was changed to display and copy the full contents of the \u2018Target:\u2019 field. This change was also implemented in the October 2025 updates for Windows 11 24H2 and Windows Server 2025. Previous .LNK file properties user interface behavior did not show all of the content of the \u0027Target:\u0027 field, including potentially malicious commands, if the content was prefaced with white space characters."
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 3.3,
              "baseSeverity": "LOW",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "cvssV4_0": {
              "attackComplexity": "LOW",
              "attackRequirements": "NONE",
              "attackVector": "LOCAL",
              "baseScore": 4.6,
              "baseSeverity": "MEDIUM",
              "privilegesRequired": "NONE",
              "subAvailabilityImpact": "NONE",
              "subConfidentialityImpact": "NONE",
              "subIntegrityImpact": "NONE",
              "userInteraction": "ACTIVE",
              "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
              "version": "4.0",
              "vulnAvailabilityImpact": "NONE",
              "vulnConfidentialityImpact": "NONE",
              "vulnIntegrityImpact": "LOW"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-9491",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-05T16:28:14.614877Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-05T16:28:39.831Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory"
            ],
            "url": "https://msrc.microsoft.com/update-guide/advisory/ADV25258226"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.virustotal.com/gui/file/a55789d49c395a9b16cb56b0544266d9ecee409fa3c5fead8082f28c2aff4e76"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "status": "affected",
              "version": "11 Enterprise 23H2 22631.4169 x64"
            }
          ]
        }
      ],
      "dateAssigned": "2025-08-26T16:25:08.884Z",
      "datePublic": "2025-03-18T13:51:41.444Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-451",
              "description": "CWE-451: User Interface (UI) Misrepresentation of Critical Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-26T16:25:15.179Z",
        "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
        "shortName": "zdi"
      },
      "references": [
        {
          "name": "ZDI-25-148",
          "tags": [
            "x_research-advisory"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-148/"
        }
      ],
      "source": {
        "lang": "en",
        "value": "Peter Girnus - Trend Micro Zero Day Initiative"
      },
      "title": "Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
    "assignerShortName": "zdi",
    "cveId": "CVE-2025-9491",
    "datePublished": "2025-08-26T16:25:15.179Z",
    "dateReserved": "2025-08-26T16:25:08.823Z",
    "dateUpdated": "2025-12-05T16:28:39.831Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-27203 (GCVE-0-2025-27203)

Vulnerability from cvelistv5 – Published: 2025-07-08 21:25 – Updated: 2025-07-10 03:55
VLAI?
Summary
Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed.
CWE
  • CWE-502 - Deserialization of Untrusted Data (CWE-502)
Assigner
References
Impacted products
Vendor Product Version
Adobe Adobe Connect Affected: 0 , ≤ 24.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-27203",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-09T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-10T03:55:56.745Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Adobe Connect",
          "vendor": "Adobe",
          "versions": [
            {
              "lessThanOrEqual": "24.0",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-07-08T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "availabilityRequirement": "NOT_DEFINED",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "confidentialityRequirement": "NOT_DEFINED",
            "environmentalScore": 9.7,
            "environmentalSeverity": "CRITICAL",
            "exploitCodeMaturity": "NOT_DEFINED",
            "integrityImpact": "HIGH",
            "integrityRequirement": "NOT_DEFINED",
            "modifiedAttackComplexity": "LOW",
            "modifiedAttackVector": "NETWORK",
            "modifiedAvailabilityImpact": "HIGH",
            "modifiedConfidentialityImpact": "HIGH",
            "modifiedIntegrityImpact": "HIGH",
            "modifiedPrivilegesRequired": "NONE",
            "modifiedScope": "CHANGED",
            "modifiedUserInteraction": "REQUIRED",
            "privilegesRequired": "NONE",
            "remediationLevel": "NOT_DEFINED",
            "reportConfidence": "NOT_DEFINED",
            "scope": "CHANGED",
            "temporalScore": 9.6,
            "temporalSeverity": "CRITICAL",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "Deserialization of Untrusted Data (CWE-502)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-08T21:25:12.448Z",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://helpx.adobe.com/security/products/connect/apsb25-61.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Adobe Connect | Deserialization of Untrusted Data (CWE-502)"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2025-27203",
    "datePublished": "2025-07-08T21:25:12.448Z",
    "dateReserved": "2025-02-19T22:28:19.024Z",
    "dateUpdated": "2025-07-10T03:55:56.745Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-40733 (GCVE-0-2022-40733)

Vulnerability from cvelistv5 – Published: 2024-12-18 22:35 – Updated: 2024-12-20 17:22
VLAI?
Summary
An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service.
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
Impacted products
Vendor Product Version
Microsoft Windows Affected: Build 22000.593
Create a notification for this product.
Credits
Discovered by Jaewon Min of Cisco Talos.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-40733",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-20T17:22:21.642102Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-20T17:22:31.797Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "status": "affected",
              "version": "Build 22000.593"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Discovered by Jaewon Min of Cisco Talos."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476: NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-18T22:35:34.539Z",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1515",
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1515"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2022-40733",
    "datePublished": "2024-12-18T22:35:34.539Z",
    "dateReserved": "2022-09-14T21:22:59.117Z",
    "dateUpdated": "2024-12-20T17:22:31.797Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-40732 (GCVE-0-2022-40732)

Vulnerability from cvelistv5 – Published: 2024-12-18 22:34 – Updated: 2024-12-20 17:22
VLAI?
Summary
An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service.
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
Impacted products
Vendor Product Version
Microsoft Windows Affected: Build 22000.593
Create a notification for this product.
Credits
Discovered by Jaewon Min of Cisco Talos.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-40732",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-20T17:21:14.517137Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-20T17:22:05.281Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "status": "affected",
              "version": "Build 22000.593"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Discovered by Jaewon Min of Cisco Talos."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476: NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-18T22:34:10.246Z",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1514",
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1514"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2022-40732",
    "datePublished": "2024-12-18T22:34:10.246Z",
    "dateReserved": "2022-09-14T21:22:59.116Z",
    "dateUpdated": "2024-12-20T17:22:05.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-50238 (GCVE-0-2022-50238)

Vulnerability from nvd – Published: 2025-09-08 00:00 – Updated: 2025-11-17 16:01
VLAI?
Summary
The on-endpoint Microsoft vulnerable driver blocklist is not fully synchronized with the online Microsoft recommended driver block rules. Some entries present on the online list have been excluded from the on-endpoint blocklist longer than the expected periodic monthly Windows updates. It is possible to fully synchronize the driver blocklist using WDAC policies. NOTE: The vendor explains that Windows Update provides a smaller, compatibility-focused driver blocklist for general users, while the full XML list is available for advanced users and organizations to customize at the risk of usability issues.
CWE
  • CWE-820 - Missing Synchronization
Assigner
Impacted products
Vendor Product Version
Microsoft Windows Affected: 10 , ≤ Server 2025 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-50238",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-30T01:13:02.958357Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-184",
                "description": "CWE-184 Incomplete List of Disallowed Inputs",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-17T16:01:40.773Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "Server 2025",
              "status": "affected",
              "version": "10",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The on-endpoint Microsoft vulnerable driver blocklist is not fully synchronized with the online Microsoft recommended driver block rules. Some entries present on the online list have been excluded from the on-endpoint blocklist longer than the expected periodic monthly Windows updates. It is possible to fully synchronize the driver blocklist using WDAC policies. NOTE: The vendor explains that Windows Update provides a smaller, compatibility-focused driver blocklist for general users, while the full XML list is available for advanced users and organizations to customize at the risk of usability issues."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-820",
              "description": "CWE-820 Missing Synchronization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-17T18:55:11.829Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/wdormann/applywdac"
        },
        {
          "url": "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-50238",
    "datePublished": "2025-09-08T00:00:00.000Z",
    "dateReserved": "2025-09-08T00:00:00.000Z",
    "dateUpdated": "2025-11-17T16:01:40.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-59033 (GCVE-0-2025-59033)

Vulnerability from nvd – Published: 2025-09-08 00:00 – Updated: 2025-11-17 15:57
VLAI?
Summary
The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. Entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate's TBS hash along with a 'FileAttribRef' qualifier (such as file name or version) may not be blocked, whether hypervisor-protected code integrity (HVCI) is enabled or not. NOTE: The vendor disputes this CVE ID assignment and states that the driver blocklist is intended for use with HVCI.
CWE
  • CWE-420 - Unprotected Alternate Channel
Assigner
Impacted products
Vendor Product Version
Microsoft Windows Affected: 10 , ≤ Server 2025 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-59033",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-30T01:13:45.514218Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-17T15:57:52.240Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "lessThanOrEqual": "Server 2025",
              "status": "affected",
              "version": "10",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Microsoft vulnerable driver block list is implemented as Windows Defender Application Control (WDAC) policy. Entries that specify only the to-be-signed (TBS) part of the code signer certificate are properly blocked, but entries that specify the signing certificate\u0027s TBS hash along with a \u0027FileAttribRef\u0027 qualifier (such as file name or version) may not be blocked, whether hypervisor-protected code integrity (HVCI) is enabled or not. NOTE: The vendor disputes this CVE ID assignment and states that the driver blocklist is intended for use with HVCI."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-420",
              "description": "CWE-420 Unprotected Alternate Channel",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-14T13:41:51.271Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules"
        },
        {
          "url": "https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity"
        },
        {
          "url": "https://x.com/JonnyJohnson_/status/1895103112924307727"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-59033",
    "datePublished": "2025-09-08T00:00:00.000Z",
    "dateReserved": "2025-09-08T00:00:00.000Z",
    "dateUpdated": "2025-11-17T15:57:52.240Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-9491 (GCVE-0-2025-9491)

Vulnerability from nvd – Published: 2025-08-26 16:25 – Updated: 2025-12-05 16:28
VLAI?
Summary
Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.
CWE
  • CWE-451 - User Interface (UI) Misrepresentation of Critical Information
Assigner
zdi
References
Impacted products
Vendor Product Version
Microsoft Windows Affected: 11 Enterprise 23H2 22631.4169 x64
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "descriptions": [
          {
            "lang": "en",
            "value": "In Windows 11 25H2 the .LNK file properties user interface was changed to display and copy the full contents of the \u2018Target:\u2019 field. This change was also implemented in the October 2025 updates for Windows 11 24H2 and Windows Server 2025. Previous .LNK file properties user interface behavior did not show all of the content of the \u0027Target:\u0027 field, including potentially malicious commands, if the content was prefaced with white space characters."
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 3.3,
              "baseSeverity": "LOW",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "cvssV4_0": {
              "attackComplexity": "LOW",
              "attackRequirements": "NONE",
              "attackVector": "LOCAL",
              "baseScore": 4.6,
              "baseSeverity": "MEDIUM",
              "privilegesRequired": "NONE",
              "subAvailabilityImpact": "NONE",
              "subConfidentialityImpact": "NONE",
              "subIntegrityImpact": "NONE",
              "userInteraction": "ACTIVE",
              "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
              "version": "4.0",
              "vulnAvailabilityImpact": "NONE",
              "vulnConfidentialityImpact": "NONE",
              "vulnIntegrityImpact": "LOW"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-9491",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-05T16:28:14.614877Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-05T16:28:39.831Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory"
            ],
            "url": "https://msrc.microsoft.com/update-guide/advisory/ADV25258226"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://www.virustotal.com/gui/file/a55789d49c395a9b16cb56b0544266d9ecee409fa3c5fead8082f28c2aff4e76"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "status": "affected",
              "version": "11 Enterprise 23H2 22631.4169 x64"
            }
          ]
        }
      ],
      "dateAssigned": "2025-08-26T16:25:08.884Z",
      "datePublic": "2025-03-18T13:51:41.444Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-451",
              "description": "CWE-451: User Interface (UI) Misrepresentation of Critical Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-26T16:25:15.179Z",
        "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
        "shortName": "zdi"
      },
      "references": [
        {
          "name": "ZDI-25-148",
          "tags": [
            "x_research-advisory"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-148/"
        }
      ],
      "source": {
        "lang": "en",
        "value": "Peter Girnus - Trend Micro Zero Day Initiative"
      },
      "title": "Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
    "assignerShortName": "zdi",
    "cveId": "CVE-2025-9491",
    "datePublished": "2025-08-26T16:25:15.179Z",
    "dateReserved": "2025-08-26T16:25:08.823Z",
    "dateUpdated": "2025-12-05T16:28:39.831Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-27203 (GCVE-0-2025-27203)

Vulnerability from nvd – Published: 2025-07-08 21:25 – Updated: 2025-07-10 03:55
VLAI?
Summary
Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed.
CWE
  • CWE-502 - Deserialization of Untrusted Data (CWE-502)
Assigner
References
Impacted products
Vendor Product Version
Adobe Adobe Connect Affected: 0 , ≤ 24.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-27203",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-09T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-10T03:55:56.745Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "Adobe Connect",
          "vendor": "Adobe",
          "versions": [
            {
              "lessThanOrEqual": "24.0",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2025-07-08T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "availabilityRequirement": "NOT_DEFINED",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "confidentialityRequirement": "NOT_DEFINED",
            "environmentalScore": 9.7,
            "environmentalSeverity": "CRITICAL",
            "exploitCodeMaturity": "NOT_DEFINED",
            "integrityImpact": "HIGH",
            "integrityRequirement": "NOT_DEFINED",
            "modifiedAttackComplexity": "LOW",
            "modifiedAttackVector": "NETWORK",
            "modifiedAvailabilityImpact": "HIGH",
            "modifiedConfidentialityImpact": "HIGH",
            "modifiedIntegrityImpact": "HIGH",
            "modifiedPrivilegesRequired": "NONE",
            "modifiedScope": "CHANGED",
            "modifiedUserInteraction": "REQUIRED",
            "privilegesRequired": "NONE",
            "remediationLevel": "NOT_DEFINED",
            "reportConfidence": "NOT_DEFINED",
            "scope": "CHANGED",
            "temporalScore": 9.6,
            "temporalSeverity": "CRITICAL",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "Deserialization of Untrusted Data (CWE-502)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-08T21:25:12.448Z",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://helpx.adobe.com/security/products/connect/apsb25-61.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Adobe Connect | Deserialization of Untrusted Data (CWE-502)"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2025-27203",
    "datePublished": "2025-07-08T21:25:12.448Z",
    "dateReserved": "2025-02-19T22:28:19.024Z",
    "dateUpdated": "2025-07-10T03:55:56.745Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-40733 (GCVE-0-2022-40733)

Vulnerability from nvd – Published: 2024-12-18 22:35 – Updated: 2024-12-20 17:22
VLAI?
Summary
An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service.
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
Impacted products
Vendor Product Version
Microsoft Windows Affected: Build 22000.593
Create a notification for this product.
Credits
Discovered by Jaewon Min of Cisco Talos.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-40733",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-20T17:22:21.642102Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-20T17:22:31.797Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Windows",
          "vendor": "Microsoft",
          "versions": [
            {
              "status": "affected",
              "version": "Build 22000.593"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Discovered by Jaewon Min of Cisco Talos."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An access violation vulnerability exists in the DirectComposition functionality win32kbase.sys driver version 10.0.22000.593 as part of Windows 11 version 22000.593 and version 10.0.20348.643 as part of Windows Server 2022 version 20348.643. A specially-crafted set of syscalls can lead to a reboot. An unprivileged user can run specially-crafted code to trigger Denial Of Service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476: NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-18T22:35:34.539Z",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1515",
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1515"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2022-40733",
    "datePublished": "2024-12-18T22:35:34.539Z",
    "dateReserved": "2022-09-14T21:22:59.117Z",
    "dateUpdated": "2024-12-20T17:22:31.797Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}