CSIRT Toscana

Aggiornamenti Mensili Microsoft (AL02/251015/CSIRT-ITA)

Data:
15 Ottobre 2025

Impatto Sistemico

Alto (72.56)

Sintesi

Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 175 nuove vulnerabilità, 2 di tipo 0-day.

Tipologia

  • Denial of Service
  • Elevation of Privilege
  • Information Disclosure
  • Remote Code Execution
  • Security Feature Bypass
  • Spoofing
  • Tampering

Descrizione e potenziali impatti

Nel dettaglio, le vulnerabilità sfruttate attivamente e/o per le quali risulta disponibile in rete anche un “proof of concept”, riguardano:

  • Windows Agere Modem Driver : identificate tramite le CVE-2025-24990 e CVE-2025-24052, entrambe di tipo “Elevation of Privilege” e con score CVSS v3 pari a 7.8. Le vulnerabilità interessano il driver legacy ltmdm64.sys, che appartiene alla famiglia dei modem Agere/Lucent, dispositivi dial-up molto diffusi tra la fine degli anni 90 e i primi 2000. Il vendor ha deciso di rimuovere tale driver per motivi di sicurezza e obsolescenza.
  • Windows Remote Access Connection Manager : identificata tramite la CVE-2025-24990, di tipo “Improper Access Control” e con score CVSS v3 pari a 7.8. Tale vulnerabilità interessa la componente RasMan, servizio volto a gestire e mantenere le connessioni di accesso remoto, e potrebbe permettere ad un utente locale l’ottenimento di privilegi elevati di tipo SYSTEM.

Prodotti e versioni affette

  • Azure – Networking
  • Azure Bot Service
  • Azure Connected Machine Agent
  • Azure Entra
  • Azure Windows Virtual Machine Agent
  • Capability Access Management Service (camsvc)
  • Dynamics 365 FastTrack Implementation Assets
  • Graphics Kernel
  • Microsoft AutoUpdate (MAU)
  • Microsoft Brokering File System
  • Microsoft Edge (Chromium-based)
  • Microsoft Graphics Component
  • Microsoft High Performance Compute Pack (HPC)
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office PowerPoint
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Office Word
  • Microsoft Virtual Hard Drive
  • Windows Hyper-V
  • SQL Server
  • Windows Ancillary Function Driver for WinSock
  • Windows BitLocker
  • Windows Bluetooth Service
  • Windows Connected Devices Platform Service
  • Windows DWM
  • Windows Defender Firewall Service
  • Windows Imaging Component
  • Windows Internet Information Services
  • Windows Kernel
  • Windows Local Security Authority Subsystem Service (LSASS)
  • Windows Management Services
  • Windows MapUrlToZone
  • Windows MultiPoint Services
  • Windows NTFS
  • Windows NTLM
  • Windows PowerShell
  • Windows Routing and Remote Access Service (RRAS)
  • Windows SMB
  • Windows SMBv3 Client
  • Windows SPNEGO Extended Negotiation
  • Windows TCP/IP
  • Windows UI XAML Maps MapControlSettings
  • Windows UI XAML Phone DatePickerFlyout
  • Windows Win32K – GRFX
  • XBox Gaming Services
  • Xbox

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.

Riferimenti

CVE

CVE-ID
CVE-2025-24052 CVE-2025-24990 CVE-2025-25004 CVE-2025-47979
CVE-2025-47989 CVE-2025-48004 CVE-2025-48813 CVE-2025-49708
CVE-2025-50152 CVE-2025-50174 CVE-2025-50175 CVE-2025-53139
CVE-2025-53150 CVE-2025-53717 CVE-2025-53768 CVE-2025-53782
CVE-2025-55240 CVE-2025-55247 CVE-2025-55248 CVE-2025-55315
CVE-2025-55320 CVE-2025-55321 CVE-2025-55325 CVE-2025-55326
CVE-2025-55328 CVE-2025-55330 CVE-2025-55331 CVE-2025-55332
CVE-2025-55333 CVE-2025-55334 CVE-2025-55335 CVE-2025-55336
CVE-2025-55337 CVE-2025-55338 CVE-2025-55339 CVE-2025-55340
CVE-2025-55676 CVE-2025-55677 CVE-2025-55678 CVE-2025-55679
CVE-2025-55680 CVE-2025-55681 CVE-2025-55682 CVE-2025-55683
CVE-2025-55684 CVE-2025-55685 CVE-2025-55686 CVE-2025-55687
CVE-2025-55688 CVE-2025-55689 CVE-2025-55690 CVE-2025-55691
CVE-2025-55692 CVE-2025-55693 CVE-2025-55694 CVE-2025-55695
CVE-2025-55696 CVE-2025-55697 CVE-2025-55698 CVE-2025-55699
CVE-2025-55700 CVE-2025-55701 CVE-2025-58714 CVE-2025-58715
CVE-2025-58716 CVE-2025-58717 CVE-2025-58718 CVE-2025-58719
CVE-2025-58720 CVE-2025-58722 CVE-2025-58724 CVE-2025-58725
CVE-2025-58726 CVE-2025-58727 CVE-2025-58728 CVE-2025-58729
CVE-2025-58730 CVE-2025-58731 CVE-2025-58732 CVE-2025-58733
CVE-2025-58734 CVE-2025-58735 CVE-2025-58736 CVE-2025-58737
CVE-2025-58738 CVE-2025-58739 CVE-2025-59184 CVE-2025-59185
CVE-2025-59186 CVE-2025-59187 CVE-2025-59188 CVE-2025-59189
CVE-2025-59190 CVE-2025-59191 CVE-2025-59192 CVE-2025-59193
CVE-2025-59194 CVE-2025-59195 CVE-2025-59196 CVE-2025-59197
CVE-2025-59198 CVE-2025-59199 CVE-2025-59200 CVE-2025-59201
CVE-2025-59202 CVE-2025-59203 CVE-2025-59204 CVE-2025-59205
CVE-2025-59206 CVE-2025-59207 CVE-2025-59208 CVE-2025-59209
CVE-2025-59210 CVE-2025-59211 CVE-2025-59213 CVE-2025-59214
CVE-2025-59218 CVE-2025-59221 CVE-2025-59222 CVE-2025-59223
CVE-2025-59224 CVE-2025-59225 CVE-2025-59226 CVE-2025-59227
CVE-2025-59228 CVE-2025-59229 CVE-2025-59230 CVE-2025-59231
CVE-2025-59232 CVE-2025-59233 CVE-2025-59234 CVE-2025-59235
CVE-2025-59236 CVE-2025-59237 CVE-2025-59238 CVE-2025-59241
CVE-2025-59242 CVE-2025-59243 CVE-2025-59244 CVE-2025-59246
CVE-2025-59247 CVE-2025-59248 CVE-2025-59249 CVE-2025-59250
CVE-2025-59252 CVE-2025-59253 CVE-2025-59254 CVE-2025-59255
CVE-2025-59257 CVE-2025-59258 CVE-2025-59259 CVE-2025-59260
CVE-2025-59261 CVE-2025-59271 CVE-2025-59272 CVE-2025-59275
CVE-2025-59277 CVE-2025-59278 CVE-2025-59280 CVE-2025-59281
CVE-2025-59282 CVE-2025-59284 CVE-2025-59285 CVE-2025-59286
CVE-2025-59287 CVE-2025-59288 CVE-2025-59289 CVE-2025-59290
CVE-2025-59291 CVE-2025-59292 CVE-2025-59294 CVE-2025-59295
CVE-2025-59494 CVE-2025-59497 CVE-2025-59502

Change log

Versione Note Data
1.0 Pubblicato il 15-10-2025 15/10/2025

Il presente articolo è un prodotto originale di csirt.gov.it, riproposto qui a solo scopo di aumentarne la visibilità. Può essere visualizzato in versione originale al seguente link

Ultimo aggiornamento

15 Ottobre 2025, 10:33