Security updates for Windows
In a recent update, Microsoft has addressed a significant number of vulnerabilities—67 in total—across its supported Windows versions, including Windows 10, Windows 11, and Windows Server. This proactive measure underscores the company’s commitment to maintaining the security of its operating systems.
However, users still operating on Windows 7 and Windows 8.1 find themselves at a disadvantage, as they have not received security updates for some time. For those whose system requirements permit, upgrading to Windows 11 24H2 is highly recommended to ensure continued protection against emerging threats.
Critical Windows vulnerabilities
Among the vulnerabilities identified, Microsoft has flagged two remote code execution (RCE) vulnerabilities as critical. The first, CVE-2025-53766, resides within the Graphics Device Interface API, impacting graphical applications. The second, CVE-2025-50165, affects the Windows Graphics Component. Alarmingly, both vulnerabilities can be exploited simply by visiting a specially crafted website, allowing attackers to inject and execute arbitrary code without any user interaction. The latter vulnerability can be triggered by embedding a malicious image within a web page.
Additionally, three vulnerabilities in Hyper-V have been categorized as critical. CVE-2025-48807 allows for code execution on the host from a guest system if exploited. CVE-2025-53781 presents a data leak risk, enabling unauthorized access to confidential information. Lastly, CVE-2025-49707 is a spoofing vulnerability that permits a virtual machine to misrepresent its identity when interacting with external systems.
Microsoft has also addressed 12 vulnerabilities within the Routing and Remote Access Service (RRAS), with half classified as RCE vulnerabilities and the other half as data leaks, all deemed high risk. This comprehensive patching effort reflects the ongoing vigilance required in today’s cybersecurity landscape.
Among the vulnerabilities previously disclosed in this Patch Tuesday is CVE-2025-53779, which affects Kerberos for Windows Server 2025. Under specific conditions, this vulnerability could allow an attacker to gain administrator rights for domains, although it has been classified as medium risk by Microsoft.