CSIRT Toscana

Aggiornamenti Mensili Microsoft (AL01/250709/CSIRT-ITA)

Data:
17 Luglio 2025 09:05

Impatto Sistemico

Critico (76.28)

Sintesi

Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 130 nuove vulnerabilità, 1 di tipo 0-day

Note : il vendor afferma che un exploit per la CVE-2025-49719 risulta disponibile in rete.

Note : un Proof of Concept (PoC) per lo sfruttamento della CVE-2025-49677 risulta disponibile in rete.

Tipologia

  • Denial of Service
  • Elevation of Privilege
  • Information Disclosure
  • Remote Code Execution
  • Security Feature Bypass
  • Spoofing
  • Tampering

Descrizione e potenziali impatti

Nel dettaglio le vulnerabilità sfruttate attivamente e/o per alcune delle quali risulta disponibile in rete anche un “proof of concept”, riguardano:

SQL Server : identificata tramite la CVE 2025 49719, di tipo ” Information Disclosure ” e con score CVSS v3 pari a 7.5. La vulnerabilità interessa il database engine di Microsoft SQL Server, presente nelle versioni 2016, 2017, 2019 e 2022, nonché i driver OLE DB for SQL Server (versioni 18 e 19): una non corretta gestione della memoria potrebbe comportare la divulgazione di informazioni sensibili qualora un attaccante remoto non autenticato riesca ad accedere a porzioni di memoria non inizializzate.

Prodotti e versioni affette

  • Azure Monitor Agent
  • Capability Access Management Service (camsvc)
  • HID class driver
  • Kernel Streaming WOW Thunk Service Driver
  • Microsoft Brokering File System
  • Microsoft Configuration Manager
  • Microsoft Edge (Chromium-based)
  • Microsoft Graphics Component
  • Microsoft Input Method Editor (IME)
  • Microsoft MPEG-2 Video Extension
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office PowerPoint
  • Microsoft Office SharePoint
  • Microsoft Office Word
  • Microsoft PC Manager
  • Microsoft Teams
  • Microsoft Windows QoS scheduler
  • Microsoft Windows Search Component
  • Office Developer Platform
  • Remote Desktop Client
  • Role: Windows Hyper-V
  • SQL Server
  • Service Fabric
  • Storage Port Driver
  • Universal Print Management Service
  • Virtual Hard Disk (VHDX)
  • Visual Studio
  • Visual Studio Code – Python extension
  • Windows Ancillary Function Driver for WinSock
  • Windows AppX Deployment Service
  • Windows BitLocker
  • Windows Connected Devices Platform Service
  • Windows Cred SSProvider Protocol
  • Windows Cryptographic Services
  • Windows Event Tracing
  • Windows Fast FAT Driver
  • Windows GDI
  • Windows Imaging Component
  • Windows KDC Proxy Service (KPSSVC)
  • Windows Kerberos
  • Windows Kernel
  • Windows MBT Transport driver
  • Windows Media
  • Windows NTFS
  • Windows Netlogon
  • Windows Notification
  • Windows Performance Recorder
  • Windows Print Spooler Components
  • Windows Remote Desktop Licensing Service
  • Windows Routing and Remote Access Service (RRAS)
  • Windows SMB
  • Windows SPNEGO Extended Negotiation
  • Windows SSDP Service
  • Windows Secure Kernel Mode
  • Windows Shell
  • Windows SmartScreen
  • Windows StateRepository API
  • Windows Storage
  • Windows Storage VSP Driver
  • Windows TCP/IP
  • Windows TDX.sys
  • Windows Universal Plug and Play (UPnP) Device Host
  • Windows Update Service
  • Windows User-Mode Driver Framework Host
  • Windows Virtualization-Based Security (VBS) Enclave
  • Windows Win32K – GRFX
  • Windows Win32K – ICOMP
  • Workspace Broker

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.

CVE

CVE-ID
CVE-2025-21195 CVE-2025-26636 CVE-2025-33054 CVE-2025-47159
CVE-2025-47178 CVE-2025-47971 CVE-2025-47972 CVE-2025-47973
CVE-2025-47975 CVE-2025-47976 CVE-2025-47978 CVE-2025-47980
CVE-2025-47981 CVE-2025-47982 CVE-2025-47984 CVE-2025-47985
CVE-2025-47986 CVE-2025-47987 CVE-2025-47988 CVE-2025-47991
CVE-2025-47993 CVE-2025-47994 CVE-2025-47996 CVE-2025-47998
CVE-2025-47999 CVE-2025-48000 CVE-2025-48001 CVE-2025-48002
CVE-2025-48003 CVE-2025-48799 CVE-2025-48800 CVE-2025-48802
CVE-2025-48803 CVE-2025-48804 CVE-2025-48805 CVE-2025-48806
CVE-2025-48808 CVE-2025-48809 CVE-2025-48810 CVE-2025-48811
CVE-2025-48812 CVE-2025-48814 CVE-2025-48815 CVE-2025-48816
CVE-2025-48817 CVE-2025-48818 CVE-2025-48819 CVE-2025-48820
CVE-2025-48821 CVE-2025-48822 CVE-2025-48823 CVE-2025-48824
CVE-2025-49657 CVE-2025-49658 CVE-2025-49659 CVE-2025-49660
CVE-2025-49661 CVE-2025-49663 CVE-2025-49664 CVE-2025-49665
CVE-2025-49666 CVE-2025-49667 CVE-2025-49668 CVE-2025-49669
CVE-2025-49670 CVE-2025-49671 CVE-2025-49672 CVE-2025-49673
CVE-2025-49674 CVE-2025-49675 CVE-2025-49676 CVE-2025-49677
CVE-2025-49678 CVE-2025-49679 CVE-2025-49680 CVE-2025-49681
CVE-2025-49682 CVE-2025-49683 CVE-2025-49684 CVE-2025-49685
CVE-2025-49686 CVE-2025-49687 CVE-2025-49688 CVE-2025-49689
CVE-2025-49690 CVE-2025-49691 CVE-2025-49693 CVE-2025-49694
CVE-2025-49695 CVE-2025-49696 CVE-2025-49697 CVE-2025-49698
CVE-2025-49699 CVE-2025-49700 CVE-2025-49701 CVE-2025-49702
CVE-2025-49703 CVE-2025-49704 CVE-2025-49705 CVE-2025-49706
CVE-2025-49711 CVE-2025-49713 CVE-2025-49714 CVE-2025-49716
CVE-2025-49717 CVE-2025-49718 CVE-2025-49719 CVE-2025-49721
CVE-2025-49722 CVE-2025-49723 CVE-2025-49724 CVE-2025-49725
CVE-2025-49726 CVE-2025-49727 CVE-2025-49729 CVE-2025-49730
CVE-2025-49731 CVE-2025-49732 CVE-2025-49733 CVE-2025-49735
CVE-2025-49737 CVE-2025-49738 CVE-2025-49739 CVE-2025-49740
CVE-2025-49741 CVE-2025-49742 CVE-2025-49744 CVE-2025-49753
CVE-2025-49756 CVE-2025-49760

Change log

Versione Note Data
1.0 Pubblicato il 09-07-2025 09/07/2025
1.1 Aggiunto dettaglio relativo alla scoperta di una PoC per la CVE-2025-49677 17/07/2025

Il presente articolo è un prodotto originale di csirt.gov.it, riproposto qui a solo scopo di aumentarne la visibilità. Può essere visualizzato in versione originale al seguente link