

PAN-OS Firewall DoS Vulnerability Allows Repeated Forced Reboots by Attacker
April 10, 2025
Multiple D-LINK DI-8100 Vulnerabilities
April 11, 2025
PAN-OS Firewall DoS Vulnerability Allows Repeated Forced Reboots by Attacker
April 10, 2025
Multiple D-LINK DI-8100 Vulnerabilities
April 11, 2025Severity
High
Analysis Summary
CVE-2025-27491 CVSS:7.1
Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network.
CVE-2025-27492 CVSS:7
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.
CVE-2025-27486 CVSS:7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
CVE-2025-27489 CVSS:7.8
Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally.
CVE-2025-27483 CVSS:7.8
Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.
CVE-2025-27487 CVSS:8
Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.
CVE-2025-27482 CVSS:8.1
Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
CVE-2025-27480 CVSS:8.1
Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.
CVE-2025-27481 CVSS:8.8
Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
CVE-2025-27485 CVSS:7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
CVE-2025-27484 CVSS:7.5
Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network.
CVE-2025-27469 CVSS:7.5
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
CVE-2025-27467 CVSS:7.8
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
CVE-2025-26679 CVSS:7.8
Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally.
CVE-2025-26678 CVSS:8.4
Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.
CVE-2025-26676 CVSS:6.5
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
CVE-2025-26675 CVSS:7.8
Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.
CVE-2025-26673 CVSS:7.5
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
CVE-2025-26672 CVSS:6.5
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
CVE-2025-26674 CVSS:7.8
Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally.
Impact
- Denial of Service
- Gain Access
- Code Execution
- Security Bypass
- Buffer Overflow
- Privilege Escalation
- Information Disclosure
Indicators of Compromise
CVE
- CVE-2025-27491
- CVE-2025-27492
- CVE-2025-27486
- CVE-2025-27489
- CVE-2025-27483
- CVE-2025-27487
- CVE-2025-27482
- CVE-2025-27480
- CVE-2025-27481
- CVE-2025-27485
- CVE-2025-27484
- CVE-2025-27469
- CVE-2025-27467
- CVE-2025-26679
- CVE-2025-26678
- CVE-2025-26676
- CVE-2025-26675
- CVE-2025-26673
- CVE-2025-26672
- CVE-2025-26674
Affected Vendors
- Microsoft
Affected Products
- Microsoft Windows Server 2022
- Microsoft Windows 10 Version 1507 10.0.0
- Microsoft Windows 10 Version 1809 - 10.0.17763.0
- Microsoft Windows Server 2019 - 10.0.17763.0
- Microsoft Windows Server 2019 (Server Core installation) - 10.0.17763.0
- Microsoft Windows Server 2022 - 10.0.20348.0
- Microsoft Windows 11 version 22H2 - 10.0.22621.0
- Microsoft Windows 10 Version 22H2 - 10.0.19045.0
- Microsoft Windows Server 2025 (Server Core installation) - 10.0.26100.0
- Microsoft Windows 11 version 22H3 - 10.0.22631.0
- Microsoft Windows 11 Version 23H2 - 10.0.22631.0
- Microsoft Windows 11 Version 24H2 - 10.0.26100.0
- Microsoft Windows Server 2016 - 10.0.14393.0
- Microsoft Windows Server 2016 (Server Core installation) - 10.0.14393.0
- Microsoft Windows 10 Version 21H2 - 10.0.19043.0
- Microsoft Windows Server 2025 - 10.0.26100.0
- Microsoft Windows 10 Version 1607 - 10.0.14393.0
- Microsoft Azure Stack OS HCI - 10.0.20349.0
- Microsoft Azure Stack HCI OS - 10.0.25398.0
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.