{"id":4677,"date":"2025-08-20T08:53:27","date_gmt":"2025-08-20T13:53:27","guid":{"rendered":"https:\/\/cert.pa\/?p=4677"},"modified":"2025-09-30T11:08:11","modified_gmt":"2025-09-30T16:08:11","slug":"csirt-panama-aviso-2025-ago-18-actualizaciones-de-seguridad-de-microsoft-para-agosto-2025","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=4677","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2025-Ago-18 Actualizaciones de seguridad de Microsoft para Agosto 2025."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2025-Ago-18 Actualizaciones de seguridad de Microsoft para Agosto 2025.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: agosto 20, 2025<br>\u00daltima revisi\u00f3n: agosto 18, 2025<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Aug<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Microsoft Dynamics 365 Sales<br>Windows DHCP Client<br>Windows Message Queuing<br>Windows Resilient File System (ReFS) Deduplication Service<br>Windows CoreMessaging<br>Azure Network Watcher<br>Windows Telephony Service<br>Microsoft Surface<br>Microsoft High Performance Compute Pack (HPC) Linux Node Agent<br>Windows Telephony Server<br>Visual Studio<br>Windows Routing and Remote Access Service (RRAS)<br>Windows Internet Connection Sharing (ICS)<br>Microsoft Edge for iOS and Android<br>Outlook for Android<br>Microsoft Edge (Chromium-based)<br>Microsoft PC Manager<br>Microsoft Windows<br>Windows Update Stack<br>Windows Remote Desktop Services<br>Windows Kerberos<br>Active Directory Domain Services<br>Windows Kernel<br>Windows Win32 Kernel Subsystem<br>Microsoft Digest Authentication<br>Windows Installer<br>Microsoft Streaming Service<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Windows NTLM<br>Windows DHCP Server<br>Microsoft Office Excel<br>Windows Storage<br>Microsoft Office<br>Microsoft Office SharePoint<br>Windows DWM Core Library<br>Windows Ancillary Function Driver for WinSock<br>Windows Setup Files Cleanup<br>Windows Disk Cleanup Tool<br>Microsoft AutoUpdate (MAU)<br>Visual Studio Code<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de agosto de 2025.<br>Este conjunto de actualizaciones remedia 107 fallas y 1 d\u00eda cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Azure File Sync<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53729\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53729<\/a><\/td><td>Microsoft Azure File Sync Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53793\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53793<\/a><\/td><td>Azure Stack Hub Information Disclosure Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Azure Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53765\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53765<\/a><\/td><td>Azure Stack Hub Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Virtual Machines<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49707\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49707<\/a><\/td><td>Azure Virtual Machines Spoofing Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Azure Virtual Machines<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53781\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53781<\/a><\/td><td>Azure Virtual Machines Information Disclosure Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Desktop Windows Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53152\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53152<\/a><\/td><td>Desktop Windows Manager Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Desktop Windows Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50153\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50153<\/a><\/td><td>Desktop Windows Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>GitHub Copilot and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53773\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53773<\/a><\/td><td>GitHub Copilot and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Graphics Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50176\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50176<\/a><\/td><td>DirectX Graphics Kernel Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Kernel Streaming WOW Thunk Service Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53149\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53149<\/a><\/td><td>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Kernel Transaction Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53140\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53140<\/a><\/td><td>Windows Kernel Transaction Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Brokering File System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53142\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53142<\/a><\/td><td>Microsoft Brokering File System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics 365 (on-premises)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49745\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49745<\/a><\/td><td>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics 365 (on-premises)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53728\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53728<\/a><\/td><td>Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49755\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49755<\/a><\/td><td>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Edge for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49736\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49736<\/a><\/td><td>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-25005\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-25005<\/a><\/td><td>Microsoft Exchange Server Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-25006\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-25006<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-25007\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-25007<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53786\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53786<\/a><\/td><td>Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-33051\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-33051<\/a><\/td><td>Microsoft Exchange Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49743\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49743<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50165\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50165<\/a><\/td><td>Windows Graphics Component Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53732\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53732<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53740\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53740<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53731\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53731<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53759\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53759<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53737\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53737<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53739\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53739<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53735\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53735<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53741\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53741<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office PowerPoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53761\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53761<\/a><\/td><td>Microsoft PowerPoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53760\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53760<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49712\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49712<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53730\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53730<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53734\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53734<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53738\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53738<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53736\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53736<\/a><\/td><td>Microsoft Word Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53784\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53784<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53733\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53733<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Teams<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53783\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53783<\/a><\/td><td>Microsoft Teams Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Access Point-to-Point Protocol (PPP) EAP-TLS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50159\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50159<\/a><\/td><td>Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50171\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50171<\/a><\/td><td>Remote Desktop Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50167\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50167<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53155\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53155<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49751\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49751<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53723\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53723<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-48807\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-48807<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49758\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49758<\/a><\/td><td>Microsoft SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24999\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24999<\/a><\/td><td>Microsoft SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53727\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53727<\/a><\/td><td>Microsoft SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49759\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49759<\/a><\/td><td>Microsoft SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47954\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-47954<\/a><\/td><td>Microsoft SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Storage Port Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53156\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53156<\/a><\/td><td>Windows Storage Port Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Web Deploy<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53772\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53772<\/a><\/td><td>Web Deploy Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53718\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53718<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53134\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53134<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49762\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49762<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53147\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53147<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53154\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53154<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53137\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53137<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53141\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53141<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50170\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50170<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Connected Devices Platform Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53721\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53721<\/a><\/td><td>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DirectX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53135\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53135<\/a><\/td><td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DirectX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50172\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50172<\/a><\/td><td>DirectX Graphics Kernel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Distributed Transaction Coordinator<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50166\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50166<\/a><\/td><td>Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows File Explorer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50154\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50154<\/a><\/td><td>Microsoft Windows File Explorer Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows GDI+<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53766\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53766<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50173\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50173<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53779\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53779<\/a><\/td><td>Windows Kerberos Elevation of Privilege Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49761\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49761<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53151\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53151<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority Subsystem Service (LSASS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53716\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53716<\/a><\/td><td>Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53131\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53131<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53145\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53145<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53143\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53143<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50177\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50177<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53144\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53144<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NT OS Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53136\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53136<\/a><\/td><td>NT OS Kernel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50158\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50158<\/a><\/td><td>Windows NTFS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53778\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53778<\/a><\/td><td>Windows NTLM Elevation of Privilege Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows PrintWorkflowUserSvc<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53133\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53133<\/a><\/td><td>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Push Notifications<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53725\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53725<\/a><\/td><td>Windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Push Notifications<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53724\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53724<\/a><\/td><td>Windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Push Notifications<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50155\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50155<\/a><\/td><td>Windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Push Notifications<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53726\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53726<\/a><\/td><td>Windows Push Notifications Apps Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53722\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53722<\/a><\/td><td>Windows Remote Desktop Services Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50157\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50157<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53153\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53153<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50163\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50163<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50162\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50162<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50164\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50164<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53148\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53148<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53138\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53138<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50156\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50156<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49757\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-49757<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53719\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53719<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53720\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53720<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50160\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50160<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Security App<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53769\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53769<\/a><\/td><td>Windows Security App Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50169\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50169<\/a><\/td><td>Windows SMB Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows StateRepository API<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53789\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53789<\/a><\/td><td>Windows StateRepository API Server file Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Subsystem for Linux<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53788\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53788<\/a><\/td><td>Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; GRFX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50161\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50161<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; GRFX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-53132\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-53132<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; ICOMP<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-50168\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-50168<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administraci\u00f3n de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: incidentes@cert.pa<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2025-Ago-18 Actualizaciones de seguridad de Microsoft para Agosto 2025.Gravedad: AltaFecha de publicaci\u00f3n: agosto 20, 2025\u00daltima revisi\u00f3n: agosto 18, 2025https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Aug Sistemas Afectados:Microsoft Dynamics 365 SalesWindows DHCP ClientWindows Message QueuingWindows Resilient File System (ReFS)&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,68,45,94],"class_list":["post-4677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4677"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4677\/revisions"}],"predecessor-version":[{"id":4678,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4677\/revisions\/4678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}