{"id":4952,"date":"2025-11-12T09:43:05","date_gmt":"2025-11-12T14:43:05","guid":{"rendered":"https:\/\/cert.pa\/?p=4952"},"modified":"2025-11-12T09:43:07","modified_gmt":"2025-11-12T14:43:07","slug":"csirt-panama-aviso-2025-nov-12-actualizaciones-de-seguridad-de-microsoft-para-noviembre-2025","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=4952","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2025-Nov-12 Actualizaciones de seguridad de Microsoft para Noviembre 2025."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2025-Nov-12 Actualizaciones de seguridad de Microsoft para Noviembre 2025.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: noviembre 12, 2025<br>\u00daltima revisi\u00f3n: noviembre 12, 2025<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Nov<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Azure Monitor Agent<br>Customer Experience Improvement Program (CEIP)<br>Dynamics 365 Field Service (online)<br>GitHub Copilot and Visual Studio Code<br>Host Process for Windows Tasks<br>Microsoft Configuration Manager<br>Microsoft Dynamics 365 (on-premises)<br>Microsoft Graphics Component<br>Microsoft Office<br>Microsoft Office Excel<br>Microsoft Office SharePoint<br>Microsoft Office Word<br>Microsoft Streaming Service<br>Microsoft Wireless Provisioning System<br>Multimedia Class Scheduler Service (MMCSS)<br>Nuance PowerScribe<br>OneDrive for Android<br>Role: Windows Hyper-V<br>SQL Server<br>Storvsp.sys Driver<br>Visual Studio<br>Visual Studio Code CoPilot Chat Extension<br>Windows Administrator Protection<br>Windows Ancillary Function Driver for WinSock<br>Windows Bluetooth RFCOM Protocol Driver<br>Windows Broadcast DVR User Service<br>Windows Client-Side Caching (CSC) Service<br>Windows Common Log File System Driver<br>Windows DirectX<br>Windows Kerberos<br>Windows Kernel<br>Windows License Manager<br>Windows OLE<br>Windows Remote Desktop<br>Windows Routing and Remote Access Service (RRAS)<br>Windows Smart Card<br>Windows Speech<br>Windows Subsystem for Linux GUI<br>Windows TDX.sys<br>Windows WLAN Service<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de noviembre de 2025.<br>Este conjunto de actualizaciones remedia 63 fallas y 1 d\u00eda cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Azure Monitor Agent<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59504\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59504<\/a><\/td><td>Azure Monitor Agent Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Customer Experience Improvement Program (CEIP)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59512\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59512<\/a><\/td><td>Customer Experience Improvement Program (CEIP) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Dynamics 365 Field Service (online)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62211\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62211<\/a><\/td><td>Dynamics 365 Field Service (online) Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Dynamics 365 Field Service (online)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62210\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62210<\/a><\/td><td>Dynamics 365 Field Service (online) Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>GitHub Copilot and Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62453\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62453<\/a><\/td><td>GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Host Process for Windows Tasks<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60710\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60710<\/a><\/td><td>Host Process for Windows Tasks Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Configuration Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47179\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-47179<\/a><\/td><td>Configuration Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics 365 (on-premises)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62206\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62206<\/a><\/td><td>Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60724\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60724<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62216\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62216<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62199\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62199<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62200\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62200<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62201\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62201<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60726\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60726<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62203\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62203<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62202\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62202<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60727\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60727<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60728\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60728<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59240\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59240<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62204\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62204<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62205\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62205<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Streaming Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59514\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59514<\/a><\/td><td>Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Wireless Provisioning System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62218\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62218<\/a><\/td><td>Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Wireless Provisioning System<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62219\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62219<\/a><\/td><td>Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Multimedia Class Scheduler Service (MMCSS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60707\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60707<\/a><\/td><td>Multimedia Class Scheduler Service (MMCSS) Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Nuance PowerScribe<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-30398\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-30398<\/a><\/td><td>Nuance PowerScribe 360 Information Disclosure Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>OneDrive for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60722\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60722<\/a><\/td><td>Microsoft OneDrive for Android Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60706\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60706<\/a><\/td><td>Windows Hyper-V Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59499\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59499<\/a><\/td><td>Microsoft SQL Server Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Storvsp.sys Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60708\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60708<\/a><\/td><td>Storvsp.sys Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62214\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62214<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio Code CoPilot Chat Extension<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62449\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62449<\/a><\/td><td>Microsoft Visual Studio Code CoPilot Chat Extension Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code CoPilot Chat Extension<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62222\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62222<\/a><\/td><td>Agentic AI and Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Administrator Protection<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60721\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60721<\/a><\/td><td>Windows Administrator Protection Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Administrator Protection<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60718\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60718<\/a><\/td><td>Windows Administrator Protection Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62217\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62217<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60719\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60719<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62213\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62213<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Bluetooth RFCOM Protocol Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59513\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59513<\/a><\/td><td>Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Broadcast DVR User Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59515\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59515<\/a><\/td><td>Windows Broadcast DVR User Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Broadcast DVR User Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60717\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60717<\/a><\/td><td>Windows Broadcast DVR User Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Client-Side Caching (CSC) Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60705\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60705<\/a><\/td><td>Windows Client-Side Caching Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60709\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60709<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DirectX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59506\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59506<\/a><\/td><td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DirectX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60716\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60716<\/a><\/td><td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows DirectX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60723\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60723<\/a><\/td><td>DirectX Graphics Kernel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60704\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60704<\/a><\/td><td>Windows Kerberos Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62215\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62215<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows License Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62208\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62208<\/a><\/td><td>Windows License Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows License Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62209\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62209<\/a><\/td><td>Windows License Manager Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60714\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60714<\/a><\/td><td>Windows OLE Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60703\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60703<\/a><\/td><td>Windows Remote Desktop Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62452\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62452<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59510\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59510<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60715\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60715<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60713\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60713<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Smart Card<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59505\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59505<\/a><\/td><td>Windows Smart Card Reader Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Speech<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59507\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59507<\/a><\/td><td>Windows Speech Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Speech<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59508\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59508<\/a><\/td><td>Windows Speech Recognition Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Speech<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59509\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59509<\/a><\/td><td>Windows Speech Recognition Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Subsystem for Linux GUI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62220\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-62220<\/a><\/td><td>Windows Subsystem for Linux GUI Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TDX.sys<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-60720\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-60720<\/a><\/td><td>Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WLAN Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59511\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-59511<\/a><\/td><td>Windows WLAN Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administraci\u00f3n de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: incidentes@cert.pa<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2025-Nov-12 Actualizaciones de seguridad de Microsoft para Noviembre 2025.Gravedad: AltaFecha de publicaci\u00f3n: noviembre 12, 2025\u00daltima revisi\u00f3n: noviembre 12, 2025https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2025-Nov Sistemas Afectados:Azure Monitor AgentCustomer Experience Improvement Program (CEIP)Dynamics 365 Field Service (online)GitHub Copilot&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-4952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4952"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4952\/revisions"}],"predecessor-version":[{"id":4954,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4952\/revisions\/4954"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}