Microsoft August 2025 Patch Tuesday

    Published: 2025-08-12. Last Updated: 2025-08-12 18:30:52 UTC
    by Renato Marinho (Version: 1)
    0 comment(s)

    This month's Microsoft patch update addresses a total of 111 vulnerabilities, with 17 classified as critical. Among these, one vulnerability was disclosed prior to the patch release, marking it as a zero-day. While none of the vulnerabilities have been exploited in the wild, the critical ones pose significant risks, including remote code execution and elevation of privilege. Users are strongly advised to apply the updates promptly to safeguard their systems against potential threats.

    Windows Kerberos Elevation of Privilege Vulnerability (CVE-2025-53779) is a disclosed zero-day vulnerability with a CVSS score of 7.2, rated as Moderate in severity. Although it has not been exploited in the wild, it poses a significant risk as it allows an attacker to gain domain administrator privileges. To exploit this vulnerability, an attacker would need high privileges, specifically access to certain attributes of the dMSA, such as msds-groupMSAMembership and msds-ManagedAccountPrecededByLink. These attributes enable the attacker to utilize the dMSA and specify a user that the dMSA can act on behalf of, potentially compromising the security of the domain.

    Windows Graphics Component Remote Code Execution Vulnerability (CVE-2025-50165) is a critical vulnerability with a CVSS score of 9.8, which has not been exploited in the wild nor disclosed publicly as a zero-day. This vulnerability allows for remote code execution, posing a significant threat due to its ability to be exploited without any user interaction. The attack vector is network-based, and the vulnerability arises from an uninitialized function pointer being called when decoding a JPEG image, which can be embedded in Office and third-party documents or files. Successful exploitation could enable an attacker to execute arbitrary code remotely, highlighting the critical need for immediate attention and remediation to prevent potential exploitation.

    GDI+ Remote Code Execution Vulnerability (CVE-2025-53766) is a critical vulnerability with a CVSS score of 9.8, which has not been exploited in the wild nor disclosed publicly as a zero-day. This vulnerability allows for remote code execution on web services parsing documents with specially crafted metafiles, without requiring any user interaction or privileges from the attacker. The attack vector is network-based, meaning an attacker could exploit this vulnerability by uploading such documents to web services, potentially leading to significant security breaches. The Preview Pane is not considered an attack vector for this vulnerability, and mitigation strategies should focus on securing web services against unauthorized document uploads.

    Azure Portal Elevation of Privilege Vulnerability (CVE-2025-53792) is a critical vulnerability with a CVSS score of 9.1, which has not been exploited in the wild nor disclosed publicly, thus not qualifying as a zero-day. This vulnerability allows for elevation of privilege, potentially enabling unauthorized access to sensitive resources within the Azure Portal. Despite its critical severity, Microsoft has already fully mitigated this vulnerability, and no further action is required from users of the service. The CVE was issued to provide transparency regarding the vulnerability and its resolution, aligning with Microsoft's commitment to greater transparency in cloud service security.

    Windows NTLM Elevation of Privilege Vulnerability (CVE-2025-53778) is a critical vulnerability, identified as CVE-2025-53778, has not been exploited in the wild nor disclosed publicly as a zero-day. It carries a CVSS score of 8.8, indicating its high severity. The vulnerability allows an attacker to elevate their privileges to SYSTEM level, posing a significant risk to affected systems. Although currently not exploited, organizations are advised to implement mitigation strategies to prevent potential exploitation and ensure the security of their systems.

    Microsoft Office Remote Code Execution Vulnerability (CVE-2025-53731) is a critical vulnerability with a CVSS score of 8.4, which has neither been exploited in the wild nor disclosed as a zero-day. This vulnerability allows for remote code execution, meaning an attacker can execute arbitrary code on the affected system, although the attack must be initiated locally. The Preview Pane in Microsoft Office serves as an attack vector, enabling the execution of malicious code when a user previews a compromised document. Despite the remote nature of the attacker's location, the exploit requires local execution, posing significant security risks if not addressed. Users are advised to apply necessary patches and updates to mitigate potential threats.

    Microsoft Word Remote Code Execution Vulnerability (CVE-2025-53733) is a critical vulnerability with a CVSS score of 8.4, which has not been exploited in the wild nor disclosed publicly, thus not qualifying as a zero-day. This vulnerability allows for remote code execution, although the attack vector is local, meaning the attacker or victim must execute code from the local machine. The Preview Pane in Microsoft Word serves as an attack vector for this vulnerability, potentially enabling arbitrary code execution. Users are advised to apply all relevant updates for their software to mitigate this risk, as multiple update packages may be necessary to fully address the vulnerability.

    Microsoft Office Remote Code Execution Vulnerability (CVE-2025-53740) is a critical vulnerability that has not been exploited in the wild nor disclosed publicly, making it a potential zero-day threat. With a CVSS score of 8.4, this vulnerability allows for remote code execution, posing a significant risk to systems running Microsoft Office. Despite the attack vector being local, the term "Remote" refers to the attacker's location, indicating that the exploit can be initiated by executing code on the local machine. The Preview Pane in Microsoft Office is identified as a potential attack vector, which could be leveraged by attackers to execute arbitrary code. Users are advised to remain vigilant and apply necessary security measures to mitigate potential risks associated with this vulnerability.

    Microsoft Word Remote Code Execution Vulnerability (CVE-2025-53784) is a critical vulnerability with a CVSS score of 8.4, which has not been exploited in the wild nor disclosed publicly, thus not qualifying as a zero-day. This vulnerability allows for remote code execution, meaning an attacker can execute arbitrary code on the affected system, although the attack must be initiated locally. The vulnerability is particularly concerning because it can be exploited through the Preview Pane, making it a potential vector for attacks. Despite its critical nature, no active exploitation has been reported, and mitigation strategies should focus on securing local execution environments and monitoring for suspicious activity.

    Microsoft 365 Copilot BizChat Information Disclosure Vulnerability (CVE-2025-53787) is a critical vulnerability with a CVSS score of 8.2, which has not been exploited in the wild nor disclosed publicly, thus not qualifying as a zero-day. This vulnerability could potentially lead to information disclosure, compromising sensitive data within the Microsoft 365 Copilot BizChat service. Despite its severity, Microsoft has already fully mitigated the issue, and there are no further actions required from users. The CVE was published to enhance transparency regarding cloud service vulnerabilities, ensuring users are informed about past security issues and their resolutions.

    This summary of Microsoft's monthly updates highlights critical vulnerabilities, emphasizing the need for immediate attention to certain threats. Notably, the Windows Graphics Component Remote Code Execution Vulnerability (CVE-2025-50165) and GDI+ Remote Code Execution Vulnerability (CVE-2025-53766) both pose significant risks due to their potential for remote exploitation without user interaction. Users should prioritize patching these vulnerabilities to prevent unauthorized code execution. Additionally, the Windows Kerberos Elevation of Privilege Vulnerability (CVE-2025-53779), a disclosed zero-day, requires high privileges to exploit but could lead to domain administrator access, necessitating careful monitoring and mitigation. While some vulnerabilities, like the Azure Portal Elevation of Privilege, have been fully mitigated by Microsoft, others demand user action to ensure system security.

     

    Description
    CVE Disclosed Exploited Exploitability (old versions) current version Severity CVSS Base (AVG) CVSS Temporal (AVG)
    Azure OpenAI Elevation of Privilege Vulnerability
    CVE-2025-53767 No No - - Critical 10.0 8.7
    Azure Portal Elevation of Privilege Vulnerability
    CVE-2025-53792 No No - - Critical 9.1 7.9
    Azure Stack Hub Information Disclosure Vulnerability
    CVE-2025-53765 No No - - Important 4.4 3.9
    CVE-2025-53793 No No - - Critical 7.5 6.5
    Azure Virtual Machines Information Disclosure Vulnerability
    CVE-2025-53781 No No - - Critical 7.7 6.7
    Azure Virtual Machines Spoofing Vulnerability
    CVE-2025-49707 No No - - Critical 7.9 6.9
    Desktop Windows Manager Elevation of Privilege Vulnerability
    CVE-2025-50153 No No - - Important 7.8 6.8
    Desktop Windows Manager Remote Code Execution Vulnerability
    CVE-2025-53152 No No - - Important 7.8 6.8
    DirectX Graphics Kernel Denial of Service Vulnerability
    CVE-2025-50172 No No - - Important 6.5 5.7
    DirectX Graphics Kernel Elevation of Privilege Vulnerability
    CVE-2025-53135 No No - - Important 7.0 6.1
    DirectX Graphics Kernel Remote Code Execution Vulnerability
    CVE-2025-50176 No No - - Critical 7.8 6.8
    GDI+ Remote Code Execution Vulnerability
    CVE-2025-53766 No No - - Critical 9.8 8.5
    GitHub Copilot and Visual Studio Remote Code Execution Vulnerability
    CVE-2025-53773 No No - - Important 7.8 6.8
    Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
    CVE-2025-53149 No No - - Important 7.8 6.8
    Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
    CVE-2025-53716 No No - - Important 6.5 5.7
    Microsoft 365 Copilot BizChat Information Disclosure Vulnerability
    CVE-2025-53774 No No - - Critical 6.5 5.7
    CVE-2025-53787 No No - - Critical 8.2 7.1
    Microsoft Azure File Sync Elevation of Privilege Vulnerability
    CVE-2025-53729 No No - - Important 7.8 6.8
    Microsoft Brokering File System Elevation of Privilege Vulnerability
    CVE-2025-53142 No No - - Important 7.0 6.1
    Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
    CVE-2025-53728 No No - - Important 6.5 5.7
    Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
    CVE-2025-49745 No No - - Important 5.4 4.7
    Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
    CVE-2025-49755 No No - - Low 4.3 3.8
    CVE-2025-49736 No No - - Moderate 4.3 3.8
    Microsoft Excel Remote Code Execution Vulnerability
    CVE-2025-53741 No No - - Important 7.8 6.8
    CVE-2025-53759 No No - - Important 7.8 6.8
    CVE-2025-53735 No No - - Important 7.8 6.8
    CVE-2025-53737 No No - - Important 7.8 6.8
    CVE-2025-53739 No No - - Important 7.8 6.8
    Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability
    CVE-2025-53786 No No - - Important 8.0 7.0
    Microsoft Exchange Server Information Disclosure Vulnerability
    CVE-2025-33051 No No - - Important 7.5 6.5
    Microsoft Exchange Server Spoofing Vulnerability
    CVE-2025-25006 No No - - Important 5.3 4.6
    CVE-2025-25007 No No - - Important 5.3 4.6
    Microsoft Exchange Server Tampering Vulnerability
    CVE-2025-25005 No No - - Important 6.5 5.7
    Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
    CVE-2025-50177 No No - - Critical 8.1 7.1
    CVE-2025-53143 No No - - Important 8.8 7.7
    CVE-2025-53144 No No - - Important 8.8 7.7
    CVE-2025-53145 No No - - Important 8.8 7.7
    Microsoft Office Remote Code Execution Vulnerability
    CVE-2025-53731 No No - - Critical 8.4 7.3
    CVE-2025-53732 No No - - Important 7.8 6.8
    CVE-2025-53740 No No - - Critical 8.4 7.3
    Microsoft Office Visio Remote Code Execution Vulnerability
    CVE-2025-53730 No No - - Important 7.8 6.8
    CVE-2025-53734 No No - - Important 7.8 6.8
    Microsoft PowerPoint Remote Code Execution Vulnerability
    CVE-2025-53761 No No - - Important 7.8 6.8
    Microsoft SQL Server Elevation of Privilege Vulnerability
    CVE-2025-49758 No No - - Important 8.8 7.7
    CVE-2025-53727 No No - - Important 8.8 7.7
    CVE-2025-24999 No No - - Important 8.8 7.7
    CVE-2025-49759 No No - - Important 8.8 7.7
    CVE-2025-47954 No No - - Important 8.8 7.7
    Microsoft SharePoint Elevation of Privilege Vulnerability
    CVE-2025-53760 No No - - Important 7.1 6.2
    Microsoft SharePoint Remote Code Execution Vulnerability
    CVE-2025-49712 No No - - Important 8.8 7.7
    Microsoft Teams Remote Code Execution Vulnerability
    CVE-2025-53783 No No - - Important 7.5 6.5
    Microsoft Windows File Explorer Spoofing Vulnerability
    CVE-2025-50154 No No - - Important 7.5 6.5
    Microsoft Word Information Disclosure Vulnerability
    CVE-2025-53736 No No - - Important 6.8 5.9
    Microsoft Word Remote Code Execution Vulnerability
    CVE-2025-53733 No No - - Critical 8.4 7.3
    CVE-2025-53738 No No - - Important 7.8 6.8
    CVE-2025-53784 No No - - Critical 8.4 7.3
    NT OS Kernel Information Disclosure Vulnerability
    CVE-2025-53136 No No - - Important 5.5 4.8
    Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability
    CVE-2025-50159 No No - - Important 7.3 6.4
    Remote Desktop Spoofing Vulnerability
    CVE-2025-50171 No No - - Important 9.1 7.9
    Web Deploy Remote Code Execution Vulnerability
    CVE-2025-53772 No No - - Important 8.8 7.7
    Win32k Elevation of Privilege Vulnerability
    CVE-2025-50161 No No - - Important 7.3 6.4
    CVE-2025-50168 No No - - Important 7.8 6.8
    CVE-2025-53132 No No - - Important 8.0 7.0
    Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
    CVE-2025-49762 No No - - Important 7.0 6.1
    CVE-2025-53134 No No - - Important 7.0 6.1
    CVE-2025-53137 No No - - Important 7.0 6.1
    CVE-2025-53141 No No - - Important 7.8 6.8
    CVE-2025-53147 No No - - Important 7.0 6.1
    CVE-2025-53154 No No - - Important 7.8 6.8
    CVE-2025-53718 No No - - Important 7.0 6.1
    Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
    CVE-2025-50170 No No - - Important 7.8 6.8
    Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
    CVE-2025-53721 No No - - Important 7.0 6.1
    Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability
    CVE-2025-50166 No No - - Important 6.5 5.7
    Windows Graphics Component Elevation of Privilege Vulnerability
    CVE-2025-49743 No No - - Important 6.7 5.8
    Windows Graphics Component Remote Code Execution Vulnerability
    CVE-2025-50165 No No - - Critical 9.8 8.5
    Windows Hyper-V Denial of Service Vulnerability
    CVE-2025-49751 No No - - Important 6.8 5.9
    Windows Hyper-V Elevation of Privilege Vulnerability
    CVE-2025-50167 No No - - Important 7.0 6.1
    CVE-2025-53155 No No - - Important 7.8 6.8
    CVE-2025-53723 No No - - Important 7.8 6.8
    Windows Hyper-V Remote Code Execution Vulnerability
    CVE-2025-48807 No No - - Critical 7.5 6.5
    Windows Installer Elevation of Privilege Vulnerability
    CVE-2025-50173 No No - - Important 7.8 6.8
    Windows Kerberos Elevation of Privilege Vulnerability
    CVE-2025-53779 Yes No - - Moderate 7.2 6.7
    Windows Kernel Elevation of Privilege Vulnerability
    CVE-2025-49761 No No - - Important 7.8 6.8
    CVE-2025-53151 No No - - Important 7.8 6.8
    Windows Kernel Transaction Manager Elevation of Privilege Vulnerability
    CVE-2025-53140 No No - - Important 7.0 6.1
    Windows Media Remote Code Execution Vulnerability
    CVE-2025-53131 No No - - Important 8.8 7.7
    Windows NTFS Information Disclosure Vulnerability
    CVE-2025-50158 No No - - Important 7.0 6.3
    Windows NTLM Elevation of Privilege Vulnerability
    CVE-2025-53778 No No - - Critical 8.8 7.7
    Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
    CVE-2025-53133 No No - - Important 7.8 6.8
    Windows Push Notifications Apps Elevation of Privilege Vulnerability
    CVE-2025-53724 No No - - Important 7.8 6.8
    CVE-2025-53725 No No - - Important 7.8 6.8
    CVE-2025-53726 No No - - Important 7.8 6.8
    CVE-2025-50155 No No - - Important 7.8 6.8
    Windows Remote Desktop ServicesDenial of Service Vulnerability
    CVE-2025-53722 No No - - Important 7.5 6.5
    Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
    CVE-2025-50156 No No - - Important 5.7 5.0
    CVE-2025-53138 No No - - Important 5.7 5.0
    CVE-2025-53148 No No - - Important 5.7 5.0
    CVE-2025-53153 No No - - Important 5.7 5.0
    CVE-2025-53719 No No - - Important 5.7 5.0
    CVE-2025-50157 No No - - Important 5.7 5.0
    Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
    CVE-2025-49757 No No - - Important 8.8 7.7
    CVE-2025-50160 No No - - Important 8.0 7.0
    CVE-2025-50162 No No - - Important 8.0 7.0
    CVE-2025-50163 No No - - Important 8.8 7.7
    CVE-2025-50164 No No - - Important 8.0 7.0
    CVE-2025-53720 No No - - Important 8.0 7.0
    Windows SMB Remote Code Execution Vulnerability
    CVE-2025-50169 No No - - Important 7.5 6.5
    Windows Security App Spoofing Vulnerability
    CVE-2025-53769 No No - - Important 5.5 4.8
    Windows StateRepository API Server file Elevation of Privilege Vulnerability
    CVE-2025-53789 No No - - Important 7.8 6.8
    Windows Storage Port Driver Information Disclosure Vulnerability
    CVE-2025-53156 No No - - Important 5.5 4.8
    Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability
    CVE-2025-53788 No No - - Important 7.0 6.1

    --
    Renato Marinho
    LinkedIn|Twitter

    Keywords:
    0 comment(s)
    ISC Stormcast For Tuesday, August 12th, 2025 https://isc.sans.edu/podcastdetail/9566

      Comments


      Diary Archives