Windows Remote Desktop Flaw Allows Remote Execution of Malicious Code
May 14, 2025Critical Adobe Illustrator Vulnerability Allows Remote Execution of Malicious Code
May 14, 2025Windows Remote Desktop Flaw Allows Remote Execution of Malicious Code
May 14, 2025Critical Adobe Illustrator Vulnerability Allows Remote Execution of Malicious Code
May 14, 2025Severity
High
Analysis Summary
CVE-2025-32709 CVSS:7.8
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
CVE-2025-32706 CVSS:7.8
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CVE-2025-32701 CVSS:7.8
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CVE-2025-30400 CVSS:7.8
Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.
CVE-2025-30397 CVSS:7.5
Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.
Impact
- Code Execution
- Privilege Escalation
Indicators of Compromise
CVE
CVE-2025-32709
CVE-2025-32706
CVE-2025-32701
CVE-2025-30400
CVE-2025-30397
Affected Vendors
- Microsoft
Affected Products
- Microsoft Windows 10 Version 1809 - 10.0.17763.0
- Microsoft Windows Server 2019 - 10.0.17763.0
- Microsoft Windows Server 2019 (Server Core installation) - 10.0.17763.0
- Microsoft Windows Server 2022 - 10.0.20348.0
- Microsoft Windows 11 version 22H2 - 10.0.22621.0
- Microsoft Windows 10 Version 22H2 - 10.0.19045.0
- Microsoft Windows Server 2025 (Server Core installation) - 10.0.26100.0
- Microsoft Windows 11 version 22H3 - 10.0.22631.0
- Microsoft Windows Server 2012 (Server Core installation) - 6.2.9200.0
- Microsoft Windows Server 2012 R2 - 6.3.9600.0
- Microsoft Windows Server 2012 R2 (Server Core installation) - 6.3.9600.0
- Microsoft Windows 11 Version 23H2 - 10.0.22631.0
- Microsoft Windows Server 2012 - 6.2.9200.0
- Microsoft Windows 11 Version 24H2 - 10.0.26100.0
- Microsoft Windows Server 2008 Service Pack 2 (Server Core installation) - 6.0.6003.0
- Microsoft Windows Server 2016 - 10.0.14393.0
- Microsoft Windows Server 2016 (Server Core installation) - 10.0.14393.0
- Microsoft Windows Server 2025 - 10.0.26100.0
- Microsoft Windows 10 Version 1507 - 10.0.10240.0
- Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation) - 6.1.7601.0
- Microsoft Windows 10 Version 1607 - 10.0.14393.0
- Microsoft Windows Server 2008 R2 Service Pack 1 - 6.1.7601.0
- Microsoft Windows 10 Version 21H2 - 10.0.19044.0
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches