Rewterz
Gh0st RAT – Active IOCs
November 4, 2025
Rewterz
Multiple Adobe Illustrator Vulnerabilities
November 4, 2025

Multiple Microsoft Windows Products Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2025-55334 CVSS:6.2

Cleartext storage of sensitive information in Windows Kernel allows an unauthorized attacker to bypass a security feature locally.

CVE-2025-58729 CVSS:6.5

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

CVE-2025-59257 CVSS:6.5

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

CVE-2025-59259 CVSS:6.5

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.

CVE-2025-59193 CVSS:7

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.

CVE-2025-59204 CVSS:5.5

Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally.

CVE-2025-59208 CVSS:7.1

Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.

CVE-2025-55339 CVSS:7.8

Out-of-bounds read in Windows NDIS allows an authorized attacker to elevate privileges locally.

CVE-2025-55335 CVSS:7.4

Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally.

CVE-2025-59284 CVSS:3.3

Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

Impact

  • Denial of Service
  • Gain Access
  • Security Bypass
  • Privilege Escalation
  • Information Disclosure

Indicators of Compromise

CVE

  • CVE-2025-55334
  • CVE-2025-58729
  • CVE-2025-59257
  • CVE-2025-59259
  • CVE-2025-59193
  • CVE-2025-59204
  • CVE-2025-59208
  • CVE-2025-55339
  • CVE-2025-55335
  • CVE-2025-59284

Affected Vendors

  • Microsoft

Affected Products

  • Microsoft Windows 10 Version 1607 for 32-bit Systems
  • Microsoft Windows 10 Version 1607 for x64-based Systems
  • Microsoft Windows 10 Version 1809 for 32-bit Systems
  • Microsoft Windows 10 Version 1809 for x64-based Systems
  • Microsoft Windows Server 2019 (Server Core installation)
  • Microsoft Windows Server 2022 (Server Core installation)
  • Microsoft Windows Server 2016 (Server Core installation)
  • Microsoft Windows Server 2025
  • Microsoft Windows 11 Version 24H2 for x64-based Systems
  • Microsoft Windows 11 Version 24H2 for ARM64-based Systems
  • Microsoft Windows 11 Version 23H2 for x64-based Systems
  • Microsoft Windows 11 Version 23H2 for ARM64-based Systems
  • Microsoft Windows Server 2025 (Server Core installation)
  • Microsoft Windows 10 Version 22H2 for x64-based Systems
  • Microsoft Windows 11 Version 22H2 for x64-based Systems
  • Microsoft Windows 11 Version 22H2 for ARM64-based Systems
  • Microsoft Windows 10 Version 21H2 for x64-based Systems
  • Microsoft Windows 10 Version 22H2 for 32-bit Systems
  • Microsoft Windows 10 Version 22H2 for ARM64-based Systems
  • Microsoft Windows 10 Version 21H2 for ARM64-based Systems
  • Microsoft Windows Server 2022 - 23H2 Edition (Server Core installation)
  • Microsoft Windows 11 Version 25H2 for ARM64-based Systems
  • Microsoft Windows 11 Version 25H2 for x64-based Systems

Remediation

Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.

CVE-2025-55334

CVE-2025-58729

CVE-2025-59257

CVE-2025-59259

CVE-2025-59193

CVE-2025-59204

CVE-2025-59208

CVE-2025-55339

CVE-2025-55335

CVE-2025-59284