CSIRT Toscana

Aggiornamenti Mensili Microsoft (AL02/250813/CSIRT-ITA)

Data:
13 Agosto 2025 09:46

Impatto Sistemico

Critico (75.89)

Sintesi

Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 111 nuove vulnerabilità, 1 di tipo 0-day.

Note: il vendor afferma che un exploit per la CVE-2025-53779 risulta disponibile in rete.

Tipologia

  • Denial of Service
  • Elevation of Privilege
  • Information Disclosure
  • Remote Code Execution
  • Spoofing
  • Tampering

Descrizione e potenziali impatti

Nel dettaglio le vulnerabilità sfruttate attivamente e/o per alcune delle quali risulta disponibile in rete anche un “proof of concept”, riguardano:

  • Windows Kerberos : identificata tramite la CVE-2025-53779 , di tipo ” Elevation of Privileg e” e con score CVSS v3 pari a 7.2. La vulnerabilità interessa la gestione dell’attributo msds-ManagedAccountPrecededByLin k introdotto in Windows Server 2025 che causa un relative path traversal nella gestione dei domain Managed Service Accounts (dMSA) . L’eventuale sfruttamento potrebbe consentire l’elevazione dei privilegi utente fino all’ottenimento del controllo completo del dominio/foresta AD.

Prodotti e versioni affette

  • Azure File Sync
  • Azure OpenAI
  • Azure Portal
  • Azure Stack
  • Azure Virtual Machines
  • Desktop Windows Manager
  • GitHub Copilot and Visual Studio
  • Graphics Kernel
  • Kernel Streaming WOW Thunk Service Driver
  • Kernel Transaction Manager
  • Microsoft 365 Copilot’s Business Chat
  • Microsoft Brokering File System
  • Microsoft Dynamics 365 (on-premises)
  • Microsoft Edge for Android
  • Microsoft Exchange Server
  • Microsoft Graphics Component
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office PowerPoint
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Office Word
  • Microsoft Teams
  • Remote Access Point-to-Point Protocol (PPP) EAP-TLS
  • Remote Desktop Server
  • Role: Windows Hyper-V
  • SQL Server
  • Storage Port Driver
  • Web Deploy
  • Windows Ancillary Function Driver for WinSock
  • Windows Cloud Files Mini Filter Driver
  • Windows Connected Devices Platform Service
  • Windows DirectX
  • Windows Distributed Transaction Coordinator
  • Windows File Explorer
  • Windows GDI+
  • Windows Installer
  • Windows Kerberos
  • Windows Kernel
  • Windows Local Security Authority Subsystem Service (LSASS)
  • Windows Media
  • Windows Message Queuing
  • Windows NT OS Kernel
  • Windows NTFS
  • Windows NTLM
  • Windows PrintWorkflowUserSvc
  • Windows Push Notifications
  • Windows Remote Desktop Services
  • Windows Routing and Remote Access Service (RRAS)
  • Windows SMB
  • Windows Security App
  • Windows StateRepository API
  • Windows Subsystem for Linux
  • Windows Win32K – GRFX
  • Windows Win32K – ICOMP

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.

Riferimenti

CVE

CVE-ID
CVE-2025-24999 CVE-2025-25005 CVE-2025-25006 CVE-2025-25007
CVE-2025-33051 CVE-2025-47954 CVE-2025-48807 CVE-2025-49707
CVE-2025-49712 CVE-2025-49736 CVE-2025-49743 CVE-2025-49745
CVE-2025-49751 CVE-2025-49755 CVE-2025-49757 CVE-2025-49758
CVE-2025-49759 CVE-2025-49761 CVE-2025-49762 CVE-2025-50153
CVE-2025-50154 CVE-2025-50155 CVE-2025-50156 CVE-2025-50157
CVE-2025-50158 CVE-2025-50159 CVE-2025-50160 CVE-2025-50161
CVE-2025-50162 CVE-2025-50163 CVE-2025-50164 CVE-2025-50165
CVE-2025-50166 CVE-2025-50167 CVE-2025-50168 CVE-2025-50169
CVE-2025-50170 CVE-2025-50171 CVE-2025-50172 CVE-2025-50173
CVE-2025-50176 CVE-2025-50177 CVE-2025-53131 CVE-2025-53132
CVE-2025-53133 CVE-2025-53134 CVE-2025-53135 CVE-2025-53136
CVE-2025-53137 CVE-2025-53138 CVE-2025-53140 CVE-2025-53141
CVE-2025-53142 CVE-2025-53143 CVE-2025-53144 CVE-2025-53145
CVE-2025-53147 CVE-2025-53148 CVE-2025-53149 CVE-2025-53151
CVE-2025-53152 CVE-2025-53153 CVE-2025-53154 CVE-2025-53155
CVE-2025-53156 CVE-2025-53716 CVE-2025-53718 CVE-2025-53719
CVE-2025-53720 CVE-2025-53721 CVE-2025-53722 CVE-2025-53723
CVE-2025-53724 CVE-2025-53725 CVE-2025-53726 CVE-2025-53727
CVE-2025-53728 CVE-2025-53729 CVE-2025-53730 CVE-2025-53731
CVE-2025-53732 CVE-2025-53733 CVE-2025-53734 CVE-2025-53735
CVE-2025-53736 CVE-2025-53737 CVE-2025-53738 CVE-2025-53739
CVE-2025-53740 CVE-2025-53741 CVE-2025-53759 CVE-2025-53760
CVE-2025-53761 CVE-2025-53765 CVE-2025-53766 CVE-2025-53767
CVE-2025-53769 CVE-2025-53772 CVE-2025-53773 CVE-2025-53774
CVE-2025-53778 CVE-2025-53779 CVE-2025-53781 CVE-2025-53783
CVE-2025-53784 CVE-2025-53786 CVE-2025-53787 CVE-2025-53788
CVE-2025-53789 CVE-2025-53792 CVE-2025-53793

Change log

Versione Note Data
1.0 Pubblicato il 13-08-2025 13/08/2025

Il presente articolo è un prodotto originale di csirt.gov.it, riproposto qui a solo scopo di aumentarne la visibilità. Può essere visualizzato in versione originale al seguente link