Sunday, August 10, 2025
Google search engine
HomeTechnologyCyber SecurityMicrosoft Patch Tuesday, July 2025 Version – Krebs on Safety

Microsoft Patch Tuesday, July 2025 Version – Krebs on Safety


Microsoft right now launched updates to repair a minimum of 137 safety vulnerabilities in its Home windows working techniques and supported software program. Not one of the weaknesses addressed this month are identified to be actively exploited, however 14 of the failings earned Microsoft’s most-dire “essential” ranking, that means they could possibly be exploited to grab management over susceptible Home windows PCs with little or no assist from customers.

Whereas not listed as essential, CVE-2025-49719 is a publicly disclosed data disclosure vulnerability, with all variations way back to SQL Server 2016 receiving patches. Microsoft charges CVE-2025-49719 as much less more likely to be exploited, however the availability of proof-of-concept code for this flaw means its patch ought to most likely be a precedence for affected enterprises.

Mike Walters, co-founder of Action1, stated CVE-2025-49719 might be exploited with out authentication, and that many third-party purposes rely on SQL server and the affected drivers — doubtlessly introducing a supply-chain threat that extends past direct SQL Server customers.

“The potential publicity of delicate data makes this a high-priority concern for organizations dealing with beneficial or regulated knowledge,” Walters stated. “The great nature of the affected variations, spanning a number of SQL Server releases from 2016 by 2022, signifies a elementary situation in how SQL Server handles reminiscence administration and enter validation.”

Adam Barnett at Rapid7 notes that right now is the tip of the street for SQL Server 2012, that means there will likely be no future safety patches even for essential vulnerabilities, even when you’re prepared to pay Microsoft for the privilege.

Barnett additionally known as consideration to CVE-2025-47981a vulnerability with a CVSS rating of 9.8 (10 being the worst), a distant code execution bug in the way in which Home windows servers and purchasers negotiate to find mutually supported authentication mechanisms. This pre-authentication vulnerability impacts any Home windows consumer machine working Home windows 10 1607 or above, and all present variations of Home windows Server. Microsoft considers it extra possible that attackers will exploit this flaw.

Microsoft additionally patched a minimum of 4 essential, distant code execution flaws in Workplace (CVE-2025-49695, CVE-2025-49696, CVE-2025-49697, CVE-2025-49702). The primary two are each rated by Microsoft as having a better probability of exploitation, don’t require consumer interplay, and might be triggered by the Preview Pane.

Two extra excessive severity bugs embrace CVE-2025-49740 (CVSS 8.8) and CVE-2025-47178 (CVSS 8.0); the previous is a weak point that might permit malicious information to bypass screening by Microsoft Defender SmartScreen, a built-in characteristic of Home windows that tries to dam untrusted downloads and malicious websites.

CVE-2025-47178 includes a distant code execution flaw in Microsoft Configuration Supervisor, an enterprise instrument for managing, deploying, and securing computer systems, servers, and gadgets throughout a community. Ben Hopkins at Immersive Labs stated this bug requires very low privileges to take advantage of, and that it’s doable for a consumer or attacker with a read-only entry function to take advantage of it.

“Exploiting this vulnerability permits an attacker to execute arbitrary SQL queries because the privileged SMS service account in Microsoft Configuration Supervisor,” Hopkins stated. “This entry can be utilized to govern deployments, push malicious software program or scripts to all managed gadgets, alter configurations, steal delicate knowledge, and doubtlessly escalate to full working system code execution throughout the enterprise, giving the attacker broad management over the whole IT atmosphere.”

Individually, Adobe has launched safety updates for a broad vary of software program, together with After Results, Adobe Audition, Illustrator, FrameMaker, and ColdFusion.

The SANS Web Storm Heart has a breakdown of every particular person patchlisted by severity. When you’re accountable for administering plenty of Home windows techniques, it might be price keeping track of AskWoody for the lowdown on any doubtlessly wonky updates (contemplating the massive variety of vulnerabilities and Home windows parts addressed this month).

When you’re a Home windows dwelling consumer, please take into account backing up your knowledge and/or drive earlier than putting in any patches, and drop a notice within the feedback when you encounter any issues with these updates.



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments