Rewterz
PAN-OS Firewall DoS Vulnerability Allows Repeated Forced Reboots by Attacker
April 10, 2025
Rewterz
Multiple D-LINK DI-8100 Vulnerabilities
April 11, 2025

Multiple Microsoft Windows Products Vulnerabilities

Severity

High

Analysis Summary

CVE-2025-27491 CVSS:7.1

Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network.

CVE-2025-27492 CVSS:7

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.

CVE-2025-27486 CVSS:7.5

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

CVE-2025-27489 CVSS:7.8

Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally.

CVE-2025-27483 CVSS:7.8

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.

CVE-2025-27487 CVSS:8

Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.

CVE-2025-27482 CVSS:8.1

Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.

CVE-2025-27480 CVSS:8.1

Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.

CVE-2025-27481 CVSS:8.8

Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.

CVE-2025-27485 CVSS:7.5

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

CVE-2025-27484 CVSS:7.5

Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network.

CVE-2025-27469 CVSS:7.5

Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

CVE-2025-27467 CVSS:7.8

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.

CVE-2025-26679 CVSS:7.8

Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally.

CVE-2025-26678 CVSS:8.4

Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.

CVE-2025-26676 CVSS:6.5

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

CVE-2025-26675 CVSS:7.8

Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.

CVE-2025-26673 CVSS:7.5

Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

CVE-2025-26672 CVSS:6.5

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

CVE-2025-26674 CVSS:7.8

Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally.

Impact

  • Denial of Service
  • Gain Access
  • Code Execution
  • Security Bypass
  • Buffer Overflow
  • Privilege Escalation
  • Information Disclosure

Indicators of Compromise

CVE

  • CVE-2025-27491
  • CVE-2025-27492
  • CVE-2025-27486
  • CVE-2025-27489
  • CVE-2025-27483
  • CVE-2025-27487
  • CVE-2025-27482
  • CVE-2025-27480
  • CVE-2025-27481
  • CVE-2025-27485
  • CVE-2025-27484
  • CVE-2025-27469
  • CVE-2025-27467
  • CVE-2025-26679
  • CVE-2025-26678
  • CVE-2025-26676
  • CVE-2025-26675
  • CVE-2025-26673
  • CVE-2025-26672
  • CVE-2025-26674

Affected Vendors

  • Microsoft

Affected Products

  • Microsoft Windows Server 2022
  • Microsoft Windows 10 Version 1507 10.0.0
  • Microsoft Windows 10 Version 1809 - 10.0.17763.0
  • Microsoft Windows Server 2019 - 10.0.17763.0
  • Microsoft Windows Server 2019 (Server Core installation) - 10.0.17763.0
  • Microsoft Windows Server 2022 - 10.0.20348.0
  • Microsoft Windows 11 version 22H2 - 10.0.22621.0
  • Microsoft Windows 10 Version 22H2 - 10.0.19045.0
  • Microsoft Windows Server 2025 (Server Core installation) - 10.0.26100.0
  • Microsoft Windows 11 version 22H3 - 10.0.22631.0
  • Microsoft Windows 11 Version 23H2 - 10.0.22631.0
  • Microsoft Windows 11 Version 24H2 - 10.0.26100.0
  • Microsoft Windows Server 2016 - 10.0.14393.0
  • Microsoft Windows Server 2016 (Server Core installation) - 10.0.14393.0
  • Microsoft Windows 10 Version 21H2 - 10.0.19043.0
  • Microsoft Windows Server 2025 - 10.0.26100.0
  • Microsoft Windows 10 Version 1607 - 10.0.14393.0
  • Microsoft Azure Stack OS HCI - 10.0.20349.0
  • Microsoft Azure Stack HCI OS - 10.0.25398.0

Remediation

Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.

CVE-2025-27491

CVE-2025-27492

CVE-2025-27486

CVE-2025-27489

CVE-2025-27483

CVE-2025-27487

CVE-2025-27482

CVE-2025-27480

CVE-2025-27481

CVE-2025-27485

CVE-2025-27484

CVE-2025-27469

CVE-2025-27467

CVE-2025-26679

CVE-2025-26678

CVE-2025-26676

CVE-2025-26675

CVE-2025-26673

CVE-2025-26672

CVE-2025-26674