Rewterz
CVE-2025-6265 – Zyxel NWA50AX PRO Firmware Vulnerability
July 15, 2025
Rewterz
Quasar RAT aka CinaRAT – Active IOCs
July 15, 2025

Multiple Microsoft Products Vulnerabilities

Severity

High

Analysis Summary

CVE-2025-49690 CVSS:7.4

Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an unauthorized attacker to elevate privileges locally.

CVE-2025-47987 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by heap-based buffer overflow in Credential Security Support Provider Protocol (CredSSP).

CVE-2025-48816 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by integer overflow or wraparound in HID class driver.

CVE-2025-49675 CVSS:7.8

Use after free in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally.

CVE-2025-49677 CVSS:7

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

CVE-2025-49693 CVSS:7.8

Double free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

CVE-2025-49694 CVSS:7.8

Null pointer dereference in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

Impact

  • Privilege Escalation
  • Buffer Overflow

Indicators of Compromise

CVE

  • CVE-2025-49690

  • CVE-2025-47987

  • CVE-2025-48816

  • CVE-2025-49675

  • CVE-2025-49677

  • CVE-2025-49693

  • CVE-2025-49694

Affected Vendors

  • Microsoft

Affected Products

  • Microsoft Windows Server 2016
  • Microsoft Windows Server 2019
  • Microsoft Windows 10 for 32-bit Systems
  • Microsoft Windows 10 for x64-based Systems
  • Microsoft Windows 10 Version 1607 for 32-bit Systems
  • Microsoft Windows 10 Version 1809 for 32-bit Systems
  • Microsoft Windows 10 Version 1809 for x64-based Systems
  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2012 R2
  • Microsoft Windows Server 2022
  • Microsoft Windows Server 2019 (Server Core installation)
  • Microsoft Windows Server 2022 (Server Core installation)
  • Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
  • Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Microsoft Windows Server 2008 for x64-based Systems Service Pack 2
  • Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
  • Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Microsoft Windows Server 2012 R2 (Server Core installation)
  • Microsoft Windows Server 2016 (Server Core installation)
  • Microsoft Windows Server 2025
  • Microsoft Windows 11 Version 24H2 for x64-based Systems
  • Microsoft Windows 11 Version 24H2 for ARM64-based Systems
  • Microsoft Windows 11 Version 23H2 for x64-based Systems
  • Microsoft Windows 11 Version 23H2 for ARM64-based Systems
  • Microsoft Windows Server 2025 (Server Core installation)
  • Microsoft Windows 10 Version 22H2 for x64-based Systems
  • Microsoft Windows 11 Version 22H2 for x64-based Systems
  • Microsoft Windows 11 Version 22H2 for ARM64-based Systems
  • Microsoft Windows 10 Version 21H2 for x64-based Systems
  • Microsoft Windows 10 Version 22H2 for 32-bit Systems
  • Microsoft Windows 10 Version 22H2 for ARM64-based Systems
  • Microsoft Windows 10 Version 21H2 for ARM64-based Systems
  • Microsoft Windows 10 Version 21H2 for 32-bit Systems
  • Microsoft Windows Server 2022 23H2 Edition (Server Core installation)

Remediation

Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.

CVE-2025-49690

CVE-2025-47987

CVE-2025-48816

CVE-2025-49675

CVE-2025-49677

CVE-2025-49693

CVE-2025-49694