{"id":4159,"date":"2025-02-11T14:17:07","date_gmt":"2025-02-11T19:17:07","guid":{"rendered":"https:\/\/cert.pa\/?p=4159"},"modified":"2025-02-11T14:17:10","modified_gmt":"2025-02-11T19:17:10","slug":"csirt-panama-aviso-2025-feb-11-actualizaciones-de-seguridad-de-microsoft-para-febrero-2025","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=4159","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2025-Feb-11 Actualizaciones de seguridad de Microsoft para Febrero 2025."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2025-Feb-11 Actualizaciones de seguridad de Microsoft para Febrero 2025.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: febrero 11, 2025<br>\u00daltima revisi\u00f3n: febrero 11, 2025<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Feb<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Microsoft Dynamics 365 Sales<br>Windows DHCP Client<br>Windows Message Queuing<br>Windows Resilient File System (ReFS) Deduplication Service<br>Windows CoreMessaging<br>Azure Network Watcher<br>Windows Telephony Service<br>Microsoft Surface<br>Microsoft High Performance Compute Pack (HPC) Linux Node Agent<br>Windows Telephony Server<br>Visual Studio<br>Windows Routing and Remote Access Service (RRAS)<br>Windows Internet Connection Sharing (ICS)<br>Microsoft Edge for iOS and Android<br>Outlook for Android<br>Microsoft Edge (Chromium-based)<br>Microsoft PC Manager<br>Microsoft Windows<br>Windows Update Stack<br>Windows Remote Desktop Services<br>Windows Kerberos<br>Active Directory Domain Services<br>Windows Kernel<br>Windows Win32 Kernel Subsystem<br>Microsoft Digest Authentication<br>Windows Installer<br>Microsoft Streaming Service<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Windows NTLM<br>Windows DHCP Server<br>Microsoft Office Excel<br>Windows Storage<br>Microsoft Office<br>Microsoft Office SharePoint<br>Windows DWM Core Library<br>Windows Ancillary Function Driver for WinSock<br>Windows Setup Files Cleanup<br>Windows Disk Cleanup Tool<br>Microsoft AutoUpdate (MAU)<br>Visual Studio Code<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de febrero de 2025.<br>Este conjunto de actualizaciones remedia 55 fallas y 4 d\u00edas cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Active Directory Domain Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21351\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21351<\/a><\/td><td>Windows Active Directory Domain Services API Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Network Watcher<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21188\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21188<\/a><\/td><td>Azure Network Watcher VM Extension Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft AutoUpdate (MAU)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24036\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24036<\/a><\/td><td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Digest Authentication<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21368\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21368<\/a><\/td><td>Microsoft Digest Authentication Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Digest Authentication<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21369\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21369<\/a><\/td><td>Microsoft Digest Authentication Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics 365 Sales<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21177\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21177<\/a><\/td><td>Microsoft Dynamics 365 Sales Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21267\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21267<\/a><\/td><td>Microsoft Edge (Chromium-based) Spoofing Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21279\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21279<\/a><\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21342\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21342<\/a><\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-0445\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-0445<\/a><\/td><td>Chromium: CVE-2025-0445 Use after free in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-0451\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-0451<\/a><\/td><td>Chromium: CVE-2025-0451 Inappropriate implementation in Extensions API<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-0444\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-0444<\/a><\/td><td>Chromium: CVE-2025-0444 Use after free in Skia<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21283\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21283<\/a><\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21404\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21404<\/a><\/td><td>Microsoft Edge (Chromium-based) Spoofing Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21408\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21408<\/a><\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge for iOS and Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21253\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21253<\/a><\/td><td>Microsoft Edge for IOS and Android Spoofing Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft High Performance Compute Pack (HPC) Linux Node Agent<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21198\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21198<\/a><\/td><td>Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21392\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21392<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21397\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21397<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21381\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21381<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21394\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21394<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21383\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21383<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21390\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21390<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21386\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21386<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21387\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21387<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21400\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21400<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft PC Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21322\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21322<\/a><\/td><td>Microsoft PC Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Streaming Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21375\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21375<\/a><\/td><td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Surface<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21194\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21194<\/a><\/td><td>Microsoft Surface Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21337\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21337<\/a><\/td><td>Windows NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-32002\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2023-32002<\/a><\/td><td>HackerOne: CVE-2023-32002 Node.js `Module._load()` policy Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Outlook for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21259\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21259<\/a><\/td><td>Microsoft Outlook Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21206\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21206<\/a><\/td><td>Visual Studio Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24039\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24039<\/a><\/td><td>Visual Studio Code Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24042\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24042<\/a><\/td><td>Visual Studio Code JS Debug Extension Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21418\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21418<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CoreMessaging<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21358\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21358<\/a><\/td><td>Windows Core Messaging Elevation of Privileges Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CoreMessaging<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21184\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21184<\/a><\/td><td>Windows Core Messaging Elevation of Privileges Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21179\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21179<\/a><\/td><td>DHCP Client Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DHCP Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21379\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21379<\/a><\/td><td>DHCP Client Service Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Disk Cleanup Tool<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21420\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21420<\/a><\/td><td>Windows Disk Cleanup Tool Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21414\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21414<\/a><\/td><td>Windows Core Messaging Elevation of Privileges Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21373\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21373<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21216\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21216<\/a><\/td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21212\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21212<\/a><\/td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21352\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21352<\/a><\/td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Internet Connection Sharing (ICS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21254\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21254<\/a><\/td><td>Internet Connection Sharing (ICS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21350\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21350<\/a><\/td><td>Windows Kerberos Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21359\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21359<\/a><\/td><td>Windows Kernel Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21376\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21376<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21181\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21181<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21377\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21377<\/a><\/td><td>NTLM Hash Disclosure Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21349\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21349<\/a><\/td><td>Windows Remote Desktop Configuration Service Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS) Deduplication Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21183\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21183<\/a><\/td><td>Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS) Deduplication Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21182\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21182<\/a><\/td><td>Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21410\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21410<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21208\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21208<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Setup Files Cleanup<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21419\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21419<\/a><\/td><td>Windows Setup Files Cleanup Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21391\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21391<\/a><\/td><td>Windows Storage Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21201\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21201<\/a><\/td><td>Windows Telephony Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21407\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21407<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21406\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21406<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21200\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21200<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21371\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21371<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21190\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21190<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21347\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21347<\/a><\/td><td>Windows Deployment Services Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32 Kernel Subsystem<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21367\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21367<\/a><\/td><td>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administraci\u00f3n de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovaci\u00f3n Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2025-Feb-11 Actualizaciones de seguridad de Microsoft para Febrero 2025.Gravedad: AltaFecha de publicaci\u00f3n: febrero 11, 2025\u00daltima revisi\u00f3n: febrero 11, 2025https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Feb Sistemas Afectados:Microsoft Dynamics 365 SalesWindows DHCP ClientWindows Message QueuingWindows Resilient File System (ReFS)&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,72,9,73,68,45,94],"class_list":["post-4159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidades","tag-windows","tag-windows-update"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4159"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4159\/revisions"}],"predecessor-version":[{"id":4160,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4159\/revisions\/4160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1843"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}