BDU:2025-15502
Vulnerability from fstec - Published: 09.12.2025
VLAI Severity ?
Title
Уязвимость службы очереди сообщений Microsoft Message Queuing (MSMQ) операционных систем Windows, позволяющая нарушителю повысить свои привилегии
Description
Уязвимость службы очереди сообщений Microsoft Message Queuing (MSMQ) операционных систем Windows связана с недостаточной проверкой вводимых данных. Эксплуатация уязвимости может позволить нарушителю повысить свои привилегии
Severity ?
Vendor
Microsoft Corp
Software Name
Windows 10 22H2, Windows 10 21H2, Windows 10 1809, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows 10 1607, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 (Server Core installation), Windows Server 2012, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 Service Pack 2 (Server Core Installation), Windows Server 2008 Service Pack 2
Software Version
до 10.0.19045.6691 (Windows 10 22H2), до 10.0.19044.6691 (Windows 10 21H2), до 10.0.17763.8146 (Windows 10 1809), до 10.0.17763.8146 (Windows Server 2019 (Server Core installation)), до 10.0.17763.8146 (Windows Server 2019), до 10.0.14393.8688 (Windows Server 2016 (Server Core installation)), до 10.0.14393.8688 (Windows Server 2016), до 10.0.14393.8688 (Windows 10 1607), до 6.3.9600.22920 (Windows Server 2012 R2 (Server Core installation)), до 6.3.9600.22920 (Windows Server 2012 R2), до 6.2.9200.25815 (Windows Server 2012 (Server Core installation)), до 6.2.9200.25815 (Windows Server 2012), до 6.1.7601.28064 (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), до 6.1.7601.28064 (Windows Server 2008 R2 Service Pack 1), до 6.0.6003.23666 (Windows Server 2008 Service Pack 2 (Server Core Installation)), до 6.0.6003.23666 (Windows Server 2008 Service Pack 2)
Possible Mitigations
Использование рекомендаций производителя:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62455
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62455
CWE
CWE-20
{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO2404, TO2415, TO2416",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO2404 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2016 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5071543), TO2415 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5071544), TO2416 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 10 21H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5071546)",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 10.0.19045.6691 (Windows 10 22H2), \u0434\u043e 10.0.19044.6691 (Windows 10 21H2), \u0434\u043e 10.0.17763.8146 (Windows 10 1809), \u0434\u043e 10.0.17763.8146 (Windows Server 2019 (Server Core installation)), \u0434\u043e 10.0.17763.8146 (Windows Server 2019), \u0434\u043e 10.0.14393.8688 (Windows Server 2016 (Server Core installation)), \u0434\u043e 10.0.14393.8688 (Windows Server 2016), \u0434\u043e 10.0.14393.8688 (Windows 10 1607), \u0434\u043e 6.3.9600.22920 (Windows Server 2012 R2 (Server Core installation)), \u0434\u043e 6.3.9600.22920 (Windows Server 2012 R2), \u0434\u043e 6.2.9200.25815 (Windows Server 2012 (Server Core installation)), \u0434\u043e 6.2.9200.25815 (Windows Server 2012), \u0434\u043e 6.1.7601.28064 (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), \u0434\u043e 6.1.7601.28064 (Windows Server 2008 R2 Service Pack 1), \u0434\u043e 6.0.6003.23666 (Windows Server 2008 Service Pack 2 (Server Core Installation)), \u0434\u043e 6.0.6003.23666 (Windows Server 2008 Service Pack 2)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62455",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.12.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "10.12.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "10.12.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-15502",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-62455",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows 10 22H2, Windows 10 21H2, Windows 10 1809, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows 10 1607, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 (Server Core installation), Windows Server 2012, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 Service Pack 2 (Server Core Installation), Windows Server 2008 Service Pack 2",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6691 32-bit, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6691 64-bit, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6691 ARM64, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6691 64-bit, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6691 ARM64, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6691 32-bit, Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.8146 32-bit, Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.8146 64-bit, Microsoft Corp Windows Server 2019 (Server Core installation) \u0434\u043e 10.0.17763.8146 , Microsoft Corp Windows Server 2019 \u0434\u043e 10.0.17763.8146 , Microsoft Corp Windows Server 2016 (Server Core installation) \u0434\u043e 10.0.14393.8688 , Microsoft Corp Windows Server 2016 \u0434\u043e 10.0.14393.8688 , Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8688 64-bit, Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8688 32-bit, Microsoft Corp Windows Server 2012 R2 (Server Core installation) \u0434\u043e 6.3.9600.22920 , Microsoft Corp Windows Server 2012 R2 \u0434\u043e 6.3.9600.22920 , Microsoft Corp Windows Server 2012 (Server Core installation) \u0434\u043e 6.2.9200.25815 , Microsoft Corp Windows Server 2012 \u0434\u043e 6.2.9200.25815 , Microsoft Corp Windows Server 2008 R2 Service Pack 1 (Server Core installation) \u0434\u043e 6.1.7601.28064 64-bit, Microsoft Corp Windows Server 2008 R2 Service Pack 1 \u0434\u043e 6.1.7601.28064 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 (Server Core Installation) \u0434\u043e 6.0.6003.23666 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 (Server Core Installation) \u0434\u043e 6.0.6003.23666 32-bit, Microsoft Corp Windows Server 2008 Service Pack 2 \u0434\u043e 6.0.6003.23666 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 \u0434\u043e 6.0.6003.23666 32-bit",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 Microsoft Message Queuing (MSMQ) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 Microsoft Message Queuing (MSMQ) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62455",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…