{"id":4153,"date":"2025-01-15T08:50:28","date_gmt":"2025-01-15T13:50:28","guid":{"rendered":"https:\/\/cert.pa\/?p=4153"},"modified":"2025-01-15T08:50:29","modified_gmt":"2025-01-15T13:50:29","slug":"csirt-panama-aviso-2025-ene-15-actualizaciones-de-seguridad-de-microsoft-para-enero-2025","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=4153","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2025-Ene-15 Actualizaciones de seguridad de Microsoft para Enero 2025."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2025-Ene-15 Actualizaciones de seguridad de Microsoft para Enero 2025.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: enero 15, 2025<br>\u00daltima revisi\u00f3n: enero 15, 2025<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Jan<\/p>\n\n\n\n<p>Sistemas Afectados:<br>.NET, .NET Framework, Visual Studio<br>Active Directory Domain Services<br>Active Directory Federation Services<br>Azure Marketplace SaaS Resources<br>BranchCache<br>Internet Explorer<br>IP Helper<br>Line Printer Daemon Service (LPD)<br>Microsoft AutoUpdate (MAU)<br>Microsoft Azure Gateway Manager<br>Microsoft Brokering File System<br>Microsoft Digest Authentication<br>Microsoft Graphics Component<br>Microsoft Office<br>Microsoft Office Access<br>Microsoft Office Excel<br>Microsoft Office OneNote<br>Microsoft Office Outlook<br>Microsoft Office Outlook for Mac<br>Microsoft Office SharePoint<br>Microsoft Office Visio<br>Microsoft Office Word<br>Microsoft Purview<br>Microsoft Windows Search Component<br>Power Automate<br>Reliable Multicast Transport Driver (RMCAST)<br>Windows BitLocker<br>Windows Boot Loader<br>Windows Boot Manager<br>Windows Client-Side Caching (CSC) Service<br>Windows Cloud Files Mini Filter Driver<br>Windows COM<br>Windows Connected Devices Platform Service<br>Windows Cryptographic Services<br>Windows Digital Media<br>Windows Direct Show<br>Windows DWM Core Library<br>Windows Event Tracing<br>Windows Geolocation Service<br>Windows Hello<br>Windows Hyper-V NT Kernel Integration VSP<br>Windows Installer<br>Windows Kerberos<br>Windows Kernel Memory<br>Windows MapUrlToZone<br>Windows Mark of the Web (MOTW)<br>Windows Message Queuing<br>Windows NTLM<br>Windows OLE<br>Windows PrintWorkflowUserSvc<br>Windows Recovery Environment Agent<br>Windows Remote Desktop Services<br>Windows Security Account Manager<br>Windows Smart Card<br>Windows SmartScreen<br>Windows SPNEGO Extended Negotiation<br>Windows Telephony Service<br>Windows Themes<br>Windows UPnP Device Host<br>Windows Virtual Trusted Platform Module<br>Windows Virtualization-Based Security (VBS) Enclave<br>Windows Web Threat Defense User Service<br>Windows Win32K &#8211; GRFX<br>Windows WLAN Auto Config Service<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de enero de 2025.<br>Este conjunto de actualizaciones remedia 159 fallas y 8 d\u00edas cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21171\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21171<\/a><\/td><td>.NET Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21173\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21173<\/a><\/td><td>.NET Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21172\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21172<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET, .NET Framework, Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21176\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21176<\/a><\/td><td>.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory Domain Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21293\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21293<\/a><\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Active Directory Federation Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21193\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21193<\/a><\/td><td>Active Directory Federation Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Marketplace SaaS Resources<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21380\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21380<\/a><\/td><td>Azure Marketplace SaaS Resources Information Disclosure Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>BranchCache<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21296\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21296<\/a><\/td><td>BranchCache Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21326\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21326<\/a><\/td><td>Internet Explorer Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>IP Helper<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21231\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21231<\/a><\/td><td>IP Helper Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Line Printer Daemon Service (LPD)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21224\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21224<\/a><\/td><td>Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft AutoUpdate (MAU)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21360\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21360<\/a><\/td><td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Azure Gateway Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21403\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21403<\/a><\/td><td>On-Premises Data Gateway Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Brokering File System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21315\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21315<\/a><\/td><td>Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Brokering File System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21372\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21372<\/a><\/td><td>Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Digest Authentication<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21294\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21294<\/a><\/td><td>Microsoft Digest Authentication Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21382\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21382<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21346\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21346<\/a><\/td><td>Microsoft Office Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21365\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21365<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Access<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21186\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21186<\/a><\/td><td>Microsoft Access Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Access<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21366\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21366<\/a><\/td><td>Microsoft Access Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Access<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21395\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21395<\/a><\/td><td>Microsoft Access Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21364\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21364<\/a><\/td><td>Microsoft Excel Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21362\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21362<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21354\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21354<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office OneNote<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21402\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21402<\/a><\/td><td>Microsoft Office OneNote Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21357\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21357<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Outlook for Mac<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21361\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21361<\/a><\/td><td>Microsoft Outlook Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21344\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21344<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21348\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21348<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21393\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21393<\/a><\/td><td>Microsoft SharePoint Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21345\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21345<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21356\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21356<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21363\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21363<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Purview<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21385\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21385<\/a><\/td><td>Microsoft Purview Information Disclosure Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Windows Search Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21292\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21292<\/a><\/td><td>Windows Search Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Power Automate<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21187\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21187<\/a><\/td><td>Microsoft Power Automate Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Reliable Multicast Transport Driver (RMCAST)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21307\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21307<\/a><\/td><td>Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21405\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21405<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-50338\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-50338<\/a><\/td><td>GitHub: CVE-2024-50338 Malformed URL allows information disclosure through git-credential-manager<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21178\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21178<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows BitLocker<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21213\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21213<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows BitLocker<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21214\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21214<\/a><\/td><td>Windows BitLocker Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Boot Loader<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21211\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21211<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Boot Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21215\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21215<\/a><\/td><td>Secure Boot Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Client-Side Caching (CSC) Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21374\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21374<\/a><\/td><td>Windows CSC Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Client-Side Caching (CSC) Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21378\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21378<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21271\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21271<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21281\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21281<\/a><\/td><td>Microsoft COM for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21272\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21272<\/a><\/td><td>Windows COM Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows COM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21288\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21288<\/a><\/td><td>Windows COM Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Connected Devices Platform Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21207\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21207<\/a><\/td><td>Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21336\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21336<\/a><\/td><td>Windows Cryptographic Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21261\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21261<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21258\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21258<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21232\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21232<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21256\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21256<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21255\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21255<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21226\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21226<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21310\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21310<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21324\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21324<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21249\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21249<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21341\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21341<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21227\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21227<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21260\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21260<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21265\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21265<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21263\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21263<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21228\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21228<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21327\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21327<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21229\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21229<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Direct Show<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21291\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21291<\/a><\/td><td>Windows Direct Show Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21304\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21304<\/a><\/td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21274\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21274<\/a><\/td><td>Windows Event Tracing Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Geolocation Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21301\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21301<\/a><\/td><td>Windows Geolocation Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hello<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21340\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21340<\/a><\/td><td>Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V NT Kernel Integration VSP<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21335\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21335<\/a><\/td><td>Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V NT Kernel Integration VSP<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21334\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21334<\/a><\/td><td>Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V NT Kernel Integration VSP<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21333\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21333<\/a><\/td><td>Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21275\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21275<\/a><\/td><td>Windows App Package Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21331\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21331<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21287\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21287<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21242\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21242<\/a><\/td><td>Windows Kerberos Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21299\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21299<\/a><\/td><td>Windows Kerberos Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21218\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21218<\/a><\/td><td>Windows Kerberos Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21316\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21316<\/a><\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21318\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21318<\/a><\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21321\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21321<\/a><\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21320\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21320<\/a><\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21317\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21317<\/a><\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21319\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21319<\/a><\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21323\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21323<\/a><\/td><td>Windows Kernel Memory Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21268\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21268<\/a><\/td><td>MapUrlToZone Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21269\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21269<\/a><\/td><td>Windows HTML Platforms Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21332\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21332<\/a><\/td><td>MapUrlToZone Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21276\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21276<\/a><\/td><td>Windows MapUrlToZone Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21219\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21219<\/a><\/td><td>MapUrlToZone Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21328\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21328<\/a><\/td><td>MapUrlToZone Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21329\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21329<\/a><\/td><td>MapUrlToZone Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MapUrlToZone<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21189\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21189<\/a><\/td><td>MapUrlToZone Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21251\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21251<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21230\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21230<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21220\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21220<\/a><\/td><td>Microsoft Message Queuing Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21270\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21270<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21285\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21285<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21290\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21290<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21289\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21289<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21277\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21277<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21217\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21217<\/a><\/td><td>Windows NTLM Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21311\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21311<\/a><\/td><td>Windows NTLM V1 Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21298\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21298<\/a><\/td><td>Windows OLE Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows PrintWorkflowUserSvc<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21235\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21235<\/a><\/td><td>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PrintWorkflowUserSvc<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21234\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21234<\/a><\/td><td>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Recovery Environment Agent<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21202\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21202<\/a><\/td><td>Windows Recovery Environment Agent Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21309\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21309<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21297\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21297<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21225\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21225<\/a><\/td><td>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21330\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21330<\/a><\/td><td>Windows Remote Desktop Services Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21278\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21278<\/a><\/td><td>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Boot<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-7344\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-7344<\/a><\/td><td>Cert CC: CVE-2024-7344 Howyar Taiwan Secure Boot Bypass<\/td><td>Important<\/td><\/tr><tr><td>Windows Security Account Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21313\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21313<\/a><\/td><td>Windows Security Account Manager (SAM) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Smart Card<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21312\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21312<\/a><\/td><td>Windows Smart Card Reader Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SmartScreen<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21314\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21314<\/a><\/td><td>Windows SmartScreen Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SPNEGO Extended Negotiation<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21295\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21295<\/a><\/td><td>SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21243\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21243<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21244\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21244<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21241\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21241<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21303\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21303<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21246\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21246<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21252\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21252<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21417\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21417<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21248\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21248<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21306\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21306<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21233\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21233<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21411\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21411<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21413\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21413<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21237\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21237<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21239\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21239<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21339\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21339<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21236\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21236<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21245\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21245<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21409\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21409<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21223\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21223<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21282\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21282<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21305\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21305<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21273\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21273<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21266\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21266<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21250\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21250<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21302\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21302<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21240\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21240<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21286\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21286<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21238\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21238<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Themes<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21308\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21308<\/a><\/td><td>Windows Themes Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows UPnP Device Host<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21300\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21300<\/a><\/td><td>Windows upnphost.dll Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows UPnP Device Host<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21389\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21389<\/a><\/td><td>Windows upnphost.dll Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtual Trusted Platform Module<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21210\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21210<\/a><\/td><td>Windows BitLocker Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtual Trusted Platform Module<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21284\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21284<\/a><\/td><td>Windows Virtual Trusted Platform Module Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtual Trusted Platform Module<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21280\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21280<\/a><\/td><td>Windows Virtual Trusted Platform Module Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtualization-Based Security (VBS) Enclave<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21370\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21370<\/a><\/td><td>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Web Threat Defense User Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21343\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21343<\/a><\/td><td>Windows Web Threat Defense User Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; GRFX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21338\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21338<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WLAN Auto Config Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21257\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21257<\/a><\/td><td>Windows WLAN AutoConfig Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administraci\u00f3n de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovaci\u00f3n Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2025-Ene-15 Actualizaciones de seguridad de Microsoft para Enero 2025.Gravedad: AltaFecha de publicaci\u00f3n: enero 15, 2025\u00daltima revisi\u00f3n: enero 15, 2025https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Jan Sistemas Afectados:.NET, .NET Framework, Visual StudioActive Directory Domain ServicesActive Directory Federation ServicesAzure Marketplace&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,72,9,73,68,45,94],"class_list":["post-4153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidades","tag-windows","tag-windows-update"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4153"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4153\/revisions"}],"predecessor-version":[{"id":4154,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4153\/revisions\/4154"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}