

Multiple NETGEAR DGND3700 Vulnerabilities
May 21, 2025
Multiple VMware Products Vulnerabilities
May 21, 2025
Multiple NETGEAR DGND3700 Vulnerabilities
May 21, 2025
Multiple VMware Products Vulnerabilities
May 21, 2025Severity
High
Analysis Summary
CVE-2025-30394 CVSS:5.9
Microsoft Windows is vulnerable to a denial of service, caused by sensitive data storage in improperly locked memory in Remote Desktop Gateway Service.
CVE-2025-27468 CVSS:7
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper privilege management in the Kernel-Mode Driver.
CVE-2025-29969 CVSS:7.5
Microsoft Windows could allow a remote authenticated attacker to execute arbitrary code on the system, caused by time-of-check time-of-use (toctou) race condition in Fundamentals.
CVE-2025-29966 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by heap-based buffer overflow in Remote Desktop.
CVE-2025-29964 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by heap-based buffer overflow in Media.
CVE-2025-29960 CVSS:6.5
Microsoft Windows could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in Routing and Remote Access Service (RRAS).
CVE-2025-29959 CVSS:6.5
Microsoft Windows could allow a remote attacker to obtain sensitive information, caused by use of uninitialized resource in Routing and Remote Access Service (RRAS).
Impact
- Denial of Service
- Code Execution
- Privilege Escalation
- Information Disclosure
Indicators of Compromise
CVE
CVE-2025-30394
CVE-2025-27468
CVE-2025-29969
CVE-2025-29966
CVE-2025-29964
CVE-2025-29960
CVE-2025-29959
Affected Vendors
- Microsoft
Affected Products
- Microsoft Windows 10 Version 1809 - 10.0.17763.0
- Microsoft Windows Server 2019 - 10.0.17763.0
- Microsoft Windows Server 2019 (Server Core installation) - 10.0.17763.0
- Microsoft Windows Server 2022 - 10.0.20348.0
- Microsoft Windows 11 version 22H2 - 10.0.22621.0
- Microsoft Windows 10 Version 22H2 - 10.0.19045.0
- Microsoft Windows Server 2025 (Server Core installation) - 10.0.26100.0
- Microsoft Windows 11 version 22H3 - 10.0.22631.0
- Microsoft Windows Server 2012 (Server Core installation) - 6.2.9200.0
- Microsoft Windows Server 2012 R2 - 6.3.9600.0
- Microsoft Windows Server 2012 R2 (Server Core installation) - 6.3.9600.0
- Microsoft Windows 11 Version 23H2 - 10.0.22631.0
- Microsoft Windows Server 2012 - 6.2.9200.0
- Microsoft Windows 11 Version 24H2 - 10.0.26100.0
- Microsoft Windows Server 2008 Service Pack 2 (Server Core installation) - 6.0.6003.0
- Microsoft Windows Server 2008 Service Pack 2 - 6.0.6003.0
- Microsoft Windows Server 2016 - 10.0.14393.0
- Microsoft Windows Server 2016 (Server Core installation) - 10.0.14393.0
- Microsoft Windows Server 2025 - 10.0.26100.0
- Microsoft Windows 10 Version 1507 - 10.0.10240.0
- Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation) - 6.1.7601.0
- Microsoft Windows 10 Version 1607 - 10.0.14393.0
- Microsoft Windows Server 2008 R2 Service Pack 1 - 6.1.7601.0
- Microsoft Windows 10 Version 21H2 - 10.0.19044.0
- Microsoft Windows App Client for Windows Desktop - 1.00
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.