

CVE-2025-3538 – D-Link DI-8100 Firmware Vulnerability
April 14, 2025
Multiple Adobe Products Vulnerabilities
April 14, 2025
CVE-2025-3538 – D-Link DI-8100 Firmware Vulnerability
April 14, 2025
Multiple Adobe Products Vulnerabilities
April 14, 2025Severity
High
Analysis Summary
CVE-2025-26671 CVSS:8.1
Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.
CVE-2025-26670 CVSS:8.1
Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.
CVE-2025-26651 CVSS:6.5
Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.
CVE-2025-26652 CVSS:7.5
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
CVE-2025-26647 CVSS:8.1
Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.
CVE-2025-26649 CVSS:7
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.
CVE-2025-26648 CVSS:7.8
Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally.
CVE-2025-26641 CVSS:7.5
Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.
CVE-2025-26644 CVSS:5.1
Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally.
CVE-2025-26640 CVSS:7
Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.
CVE-2025-26642 CVSS:7.8
Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-26637 CVSS:6.8
Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
CVE-2025-26639 CVSS:7.8
Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally.
CVE-2025-26635 CVSS:6.5
Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.
CVE-2025-24058 CVSS:7.8
Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.
CVE-2025-21222 CVSS:8.8
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
CVE-2025-21204 CVSS:7.8
Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally.
CVE-2025-21221 CVSS:8.8
Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.
CVE-2025-21203 CVSS:6.5
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
CVE-2025-21191 CVSS:7
Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.
Impact
- Denial of Service
- Gain Access
- Code Execution
- Security Bypass
- Buffer Overflow
- Privilege Escalation
- Information Disclosure
Indicators of Compromise
CVE
- CVE-2025-26671
- CVE-2025-26670
- CVE-2025-26651
- CVE-2025-26652
- CVE-2025-26647
- CVE-2025-26649
- CVE-2025-26648
- CVE-2025-26641
- CVE-2025-26644
- CVE-2025-26640
- CVE-2025-26642
- CVE-2025-26637
- CVE-2025-26639
- CVE-2025-26635
- CVE-2025-24058
- CVE-2025-21222
- CVE-2025-21204
- CVE-2025-21221
- CVE-2025-21203
- CVE-2025-21191
Affected Vendors
- Microsoft
Affected Products
- Microsoft Windows Server 2022
- Microsoft 365 Apps for Enterprise - 16.0.1
- Microsoft Office 2019 - 19.0.0
- Microsoft Office LTSC 2021 - 16.0.1
- Microsoft SharePoint Server 2019 - 16.0.0
- Microsoft Office LTSC 2024 - 1.0.0
- Microsoft Excel 2016 - 16.0.0.0
- Microsoft Office Online Server - 1.0.0
- Microsoft Windows 10 Version 1809 - 10.0.17763.0
- Microsoft Windows Server 2019 - 10.0.17763.0
- Microsoft Windows Server 2019 (Server Core installation) - 10.0.17763.0
- Microsoft Windows Server 2022 - 10.0.20348.0
- Microsoft Windows 11 version 22H2 - 10.0.22621.0
- Microsoft Windows 10 Version 22H2 - 10.0.19045.0
- Microsoft Windows Server 2025 (Server Core installation) - 10.0.26100.0
- Microsoft Windows 11 version 22H3 - 10.0.22631.0
- Microsoft Windows Server 2012 (Server Core installation) - 6.2.9200.0
- Microsoft Windows Server 2012 R2 - 6.3.9600.0
- Microsoft Windows Server 2012 R2 (Server Core installation) - 6.3.9600.0
- Microsoft Windows 11 Version 23H2 - 10.0.22631.0
- Microsoft Windows Server 2012 - 6.2.9200.0
- Microsoft Windows 11 Version 24H2 - 10.0.26100.0
- Microsoft Windows Server 2008 Service Pack 2 (Server Core installation) - 6.0.6003.0
- Microsoft Windows Server 2008 Service Pack 2 - 6.0.6003.0
- Microsoft Windows Server 2016 - 10.0.14393.0
- Microsoft Windows Server 2016 (Server Core installation) - 10.0.14393.0
- Microsoft Windows 10 Version 21H2 - 10.0.19043.0
- Microsoft Windows Server 2025 - 10.0.26100.0
- Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation) - 6.1.7601.0
- Microsoft Windows 10 Version 1607 - 10.0.14393.0
- Microsoft Windows Server 2008 R2 Service Pack 1 - 6.1.7601.0
- Microsoft Windows 10 Version 1507
- Microsoft Office LTSC for Mac 2021 - N/A
- Microsoft Office LTSC for Mac 2024 - N/A
- Microsoft Office 2016 - 16.0.0
- Microsoft Access 2016 (32-bit edition) - 16.0.0
- Microsoft Access 2016 - 16.0.0
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.