Multiple NETGEAR DGND3700 Vulnerabilities
May 21, 2025Multiple VMware Products Vulnerabilities
May 21, 2025Multiple NETGEAR DGND3700 Vulnerabilities
May 21, 2025Multiple VMware Products Vulnerabilities
May 21, 2025Severity
High
Analysis Summary
CVE-2025-30394 CVSS:5.9
Microsoft Windows is vulnerable to a denial of service, caused by sensitive data storage in improperly locked memory in Remote Desktop Gateway Service.
CVE-2025-27468 CVSS:7
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper privilege management in the Kernel-Mode Driver.
CVE-2025-29969 CVSS:7.5
Microsoft Windows could allow a remote authenticated attacker to execute arbitrary code on the system, caused by time-of-check time-of-use (toctou) race condition in Fundamentals.
CVE-2025-29966 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by heap-based buffer overflow in Remote Desktop.
CVE-2025-29964 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by heap-based buffer overflow in Media.
CVE-2025-29960 CVSS:6.5
Microsoft Windows could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read in Routing and Remote Access Service (RRAS).
CVE-2025-29959 CVSS:6.5
Microsoft Windows could allow a remote attacker to obtain sensitive information, caused by use of uninitialized resource in Routing and Remote Access Service (RRAS).
Impact
- Denial of Service
- Code Execution
- Privilege Escalation
- Information Disclosure
Indicators of Compromise
CVE
CVE-2025-30394
CVE-2025-27468
CVE-2025-29969
CVE-2025-29966
CVE-2025-29964
CVE-2025-29960
CVE-2025-29959
Affected Vendors
- Microsoft
Affected Products
- Microsoft Windows 10 Version 1809 - 10.0.17763.0
- Microsoft Windows Server 2019 - 10.0.17763.0
- Microsoft Windows Server 2019 (Server Core installation) - 10.0.17763.0
- Microsoft Windows Server 2022 - 10.0.20348.0
- Microsoft Windows 11 version 22H2 - 10.0.22621.0
- Microsoft Windows 10 Version 22H2 - 10.0.19045.0
- Microsoft Windows Server 2025 (Server Core installation) - 10.0.26100.0
- Microsoft Windows 11 version 22H3 - 10.0.22631.0
- Microsoft Windows Server 2012 (Server Core installation) - 6.2.9200.0
- Microsoft Windows Server 2012 R2 - 6.3.9600.0
- Microsoft Windows Server 2012 R2 (Server Core installation) - 6.3.9600.0
- Microsoft Windows 11 Version 23H2 - 10.0.22631.0
- Microsoft Windows Server 2012 - 6.2.9200.0
- Microsoft Windows 11 Version 24H2 - 10.0.26100.0
- Microsoft Windows Server 2008 Service Pack 2 (Server Core installation) - 6.0.6003.0
- Microsoft Windows Server 2008 Service Pack 2 - 6.0.6003.0
- Microsoft Windows Server 2016 - 10.0.14393.0
- Microsoft Windows Server 2016 (Server Core installation) - 10.0.14393.0
- Microsoft Windows Server 2025 - 10.0.26100.0
- Microsoft Windows 10 Version 1507 - 10.0.10240.0
- Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation) - 6.1.7601.0
- Microsoft Windows 10 Version 1607 - 10.0.14393.0
- Microsoft Windows Server 2008 R2 Service Pack 1 - 6.1.7601.0
- Microsoft Windows 10 Version 21H2 - 10.0.19044.0
- Microsoft Windows App Client for Windows Desktop - 1.00
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.