{"id":5032,"date":"2026-04-16T11:27:24","date_gmt":"2026-04-16T16:27:24","guid":{"rendered":"https:\/\/cert.pa\/?p=5032"},"modified":"2026-04-16T11:36:35","modified_gmt":"2026-04-16T16:36:35","slug":"csirt-panama-aviso-2026-abr-16-actualizaciones-de-seguridad-de-microsoft-para-abril-2026","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=5032","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2026-Abr-16 Actualizaciones de seguridad de Microsoft para Abril 2026."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2026-Abr-16 Actualizaciones de seguridad de Microsoft para Abril 2026.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: abril 16, 2026<br>\u00daltima revisi\u00f3n: abril 16, 2026<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Apr<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Active Directory Domain Services<br>ASP.NET Core<br>Azure Local<br>Azure Local Cluster<br>Azure Portal Windows Admin Center<br>Dynamics Business Central<br>Microsoft AutoUpdate (MAU)<br>Microsoft Edge (Chromium-based)<br>Microsoft Edge for iOS<br>Microsoft Office<br>Microsoft Office Excel<br>Microsoft Office OneNote<br>Microsoft Office SharePoint<br>Microsoft Office Word<br>Microsoft Streaming Service<br>Microsoft Virtual Hard Drive<br>OpenSSH for Windows<br>Outlook for Android<br>Remote Desktop Client<br>Remote Desktop Gateway Service<br>RPC Endpoint Mapper Service<br>System Center<br>Visual Studio<br>Visual Studio Code<br>Visual Studio Tools for Applications and SQL Server Management Studio<br>Windows Active Directory Certificate Services<br>Windows BitLocker<br>Windows Bluetooth Service<br>Windows Common Log File System Driver<br>Windows Cryptographic Services<br>Windows Defender Application Control (WDAC)<br>Windows Digital Media<br>Windows DWM Core Library<br>Windows Hello<br>Windows HTTP.sys<br>Windows Hyper-V<br>Windows Installer<br>Windows Kerberos<br>Windows Kernel<br>Windows Kernel Memory<br>Windows Kernel-Mode Drivers<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Windows Local Security Authority (LSA)<br>Windows Local Session Manager (LSM)<br>Windows Mark of the Web (MOTW)<br>Windows Media<br>Windows Mobile Broadband<br>Windows NTFS<br>Windows Power Dependency Coordinator<br>Windows Remote Desktop Services<br>Windows Resilient File System (ReFS)<br>Windows Routing and Remote Access Service (RRAS)<br>Windows Secure Channel<br>Windows Security Zone Mapping<br>Windows Shell<br>Windows Standards-Based Storage Management Service<br>Windows Subsystem for Linux<br>Windows TCP\/IP<br>Windows Telephony Service<br>Windows Universal Plug and Play (UPnP) Device Host<br>Windows Update Stack<br>Windows upnphost.dll<br>Windows USB Print Driver<br>Windows Virtualization-Based Security (VBS) Enclave<br>Windows Win32K &#8211; GRFX<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de abril de 2026.<br>Este conjunto de actualizaciones remedia 167 fallas y 2 d\u00eda cero (1 altamente explotado).<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>Active Directory Domain Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29810\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29810<\/a><\/td><td>Active Directory Domain Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>ASP.NET Core<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26682\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26682<\/a><\/td><td>ASP.NET Core and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Local<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27489\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27489<\/a><\/td><td>Azure Local Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Local Cluster<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26628\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26628<\/a><\/td><td>Azure Local Cluster Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Local Cluster<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-25002\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-25002<\/a><\/td><td>Azure Local Cluster Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Portal Windows Admin Center<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29819\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29819<\/a><\/td><td>Windows Admin Center in Azure Portal Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Dynamics Business Central<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29821\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29821<\/a><\/td><td>Microsoft Dynamics Business Central Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft AutoUpdate (MAU)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29800\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29800<\/a><\/td><td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft AutoUpdate (MAU)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29801\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29801<\/a><\/td><td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3073\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3073<\/a><\/td><td>Chromium: CVE-2025-3073 Inappropriate implementation in Autofill<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3068\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3068<\/a><\/td><td>Chromium: CVE-2025-3068 Inappropriate implementation in Intents<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3074\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3074<\/a><\/td><td>Chromium: CVE-2025-3074 Inappropriate implementation in Downloads<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3067\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3067<\/a><\/td><td>Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3071\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3071<\/a><\/td><td>Chromium: CVE-2025-3071 Inappropriate implementation in Navigations<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3072\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3072<\/a><\/td><td>Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3070\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3070<\/a><\/td><td>Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3069\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3069<\/a><\/td><td>Chromium: CVE-2025-3069 Inappropriate implementation in Extensions<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-25000\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-25000<\/a><\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29815\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29815<\/a><\/td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-25001\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-25001<\/a><\/td><td>Microsoft Edge for iOS Spoofing Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-3066\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-3066<\/a><\/td><td>Chromium: CVE-2025-3066 Use after free in Navigations<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge for iOS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29796\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29796<\/a><\/td><td>Microsoft Edge for iOS Spoofing Vulnerability<\/td><td>Low<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27745\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27745<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27744\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27744<\/a><\/td><td>Microsoft Office Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26642\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26642<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29792\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29792<\/a><\/td><td>Microsoft Office Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29791\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29791<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27748\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27748<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27746\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27746<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27749\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27749<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27751\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27751<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27750\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27750<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29823\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29823<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27752\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27752<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Office OneNote<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29822\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29822<\/a><\/td><td>Microsoft OneNote Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29794\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29794<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29793\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29793<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27747\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27747<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29816\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29816<\/a><\/td><td>Microsoft Word Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29820\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29820<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Streaming Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27471\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27471<\/a><\/td><td>Microsoft Streaming Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Virtual Hard Drive<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26688\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26688<\/a><\/td><td>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>OpenSSH for Windows<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27731\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27731<\/a><\/td><td>Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Outlook for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29805\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29805<\/a><\/td><td>Outlook for Android Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27487\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27487<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Gateway Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27482\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27482<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Remote Desktop Gateway Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27480\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27480<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>RPC Endpoint Mapper Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26679\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26679<\/a><\/td><td>RPC Endpoint Mapper Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>System Center<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27743\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27743<\/a><\/td><td>Microsoft System Center Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29802\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29802<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29804\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29804<\/a><\/td><td>Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-20570\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-20570<\/a><\/td><td>Visual Studio Code Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Tools for Applications and SQL Server Management Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29803\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29803<\/a><\/td><td>Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Active Directory Certificate Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27740\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27740<\/a><\/td><td>Active Directory Certificate Services Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows BitLocker<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26637\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26637<\/a><\/td><td>BitLocker Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Bluetooth Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27490\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27490<\/a><\/td><td>Windows Bluetooth Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29824\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29824<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29808\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29808<\/a><\/td><td>Windows Cryptographic Services Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26641\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26641<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Defender Application Control (WDAC)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26678\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26678<\/a><\/td><td>Windows Defender Application Control Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27730\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27730<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27467\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27467<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26640\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26640<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Digital Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27476\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27476<\/a><\/td><td>Windows Digital Media Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24074\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24074<\/a><\/td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24073\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24073<\/a><\/td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24058\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24058<\/a><\/td><td>Windows DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24062\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24062<\/a><\/td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DWM Core Library<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-24060\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-24060<\/a><\/td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hello<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26635\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26635<\/a><\/td><td>Windows Hello Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hello<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26644\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26644<\/a><\/td><td>Windows Hello Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows HTTP.sys<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27473\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27473<\/a><\/td><td>HTTP.sys Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27491\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27491<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27727\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27727<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26647\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26647<\/a><\/td><td>Windows Kerberos Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27479\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27479<\/a><\/td><td>Kerberos Key Distribution Proxy Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29809\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29809<\/a><\/td><td>Windows Kerberos Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26648\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26648<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27739\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27739<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel Memory<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29812\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29812<\/a><\/td><td>DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel-Mode Drivers<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27728\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27728<\/a><\/td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26673\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26673<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26663\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26663<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27469\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27469<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26670\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26670<\/a><\/td><td>Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Local Security Authority (LSA)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21191\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21191<\/a><\/td><td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority (LSA)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27478\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27478<\/a><\/td><td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Session Manager (LSM)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26651\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26651<\/a><\/td><td>Windows Local Session Manager (LSM) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mark of the Web (MOTW)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27472\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27472<\/a><\/td><td>Windows Mark of the Web Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26666\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26666<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26674\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26674<\/a><\/td><td>Windows Media Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-29811\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-29811<\/a><\/td><td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27742\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27742<\/a><\/td><td>NTFS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21197\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21197<\/a><\/td><td>Windows NTFS Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27741\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27741<\/a><\/td><td>NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27483\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27483<\/a><\/td><td>NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27733\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27733<\/a><\/td><td>NTFS Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Power Dependency Coordinator<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27736\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27736<\/a><\/td><td>Windows Power Dependency Coordinator Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26671\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26671<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27738\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27738<\/a><\/td><td>Windows Resilient File System (ReFS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27474\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27474<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21203\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21203<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26668\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26668<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26667\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26667<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26664\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26664<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26672\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26672<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26669\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26669<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26676\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26676<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Channel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27492\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27492<\/a><\/td><td>Windows Secure Channel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Channel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26649\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26649<\/a><\/td><td>Windows Secure Channel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Security Zone Mapping<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27737\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27737<\/a><\/td><td>Windows Security Zone Mapping Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27729\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27729<\/a><\/td><td>Windows Shell Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Standards-Based Storage Management Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27485\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27485<\/a><\/td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Standards-Based Storage Management Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27486\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27486<\/a><\/td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Standards-Based Storage Management Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21174\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21174<\/a><\/td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Standards-Based Storage Management Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26680\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26680<\/a><\/td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Standards-Based Storage Management Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27470\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27470<\/a><\/td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Standards-Based Storage Management Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26652\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26652<\/a><\/td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Subsystem for Linux<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26675\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26675<\/a><\/td><td>Windows Subsystem for Linux Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TCP\/IP<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26686\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26686<\/a><\/td><td>Windows TCP\/IP Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27481\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27481<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21222\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21222<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21205\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21205<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21221\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21221<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27477\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27477<\/a><\/td><td>Windows Telephony Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Universal Plug and Play (UPnP) Device Host<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27484\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27484<\/a><\/td><td>Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-21204\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-21204<\/a><\/td><td>Windows Process Activation Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27475\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27475<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows upnphost.dll<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26665\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26665<\/a><\/td><td>Windows upnphost.dll Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows USB Print Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26639\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26639<\/a><\/td><td>Windows USB Print Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtualization-Based Security (VBS) Enclave<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27735\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27735<\/a><\/td><td>Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; GRFX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-27732\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-27732<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; GRFX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26687\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26687<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Win32K &#8211; GRFX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-26681\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2025-26681<\/a><\/td><td>Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administraci\u00f3n de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: incidentes@cert.pa<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2026-Abr-16 Actualizaciones de seguridad de Microsoft para Abril 2026.Gravedad: AltaFecha de publicaci\u00f3n: abril 16, 2026\u00daltima revisi\u00f3n: abril 16, 2026https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-Apr Sistemas Afectados:Active Directory Domain ServicesASP.NET CoreAzure LocalAzure Local ClusterAzure Portal Windows Admin CenterDynamics&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,72,9,80,94],"class_list":["post-5032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-vulnerabilidad","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5032"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5032\/revisions"}],"predecessor-version":[{"id":5034,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/5032\/revisions\/5034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}