找回密码
 注册创意安天

漏洞风险提示(20250213)

[复制链接]
发表于 2025-2-13 08:27 | 显示全部楼层 |阅读模式
免责声明:以下内容原文来自互联网的公共方式,仅用于有限分享,译文内容不代表安天实验室观点,因此第三方对以下内 容进行分享、传播等行为,以及所带来的一切后果与译者和安天实验室无关。以下内容亦不得用于任何商业目的,若产生法律责任,译者与安天实验室一律不予承担。

1 Windows存储权限提升漏洞(CVE-2025-21391)
一、漏洞描述:
         Microsoft Windows.jpg
        Windows存储中存在权限提升漏洞,由于Windows存储中的不正确链接解析,本地攻击者可以在目标系统上以SYSTEM权限执行代码,删除任意文件。
二、风险等级:
        高
三、影响范围:
        Windows Server 2016 (Server Core installation)
        Windows Server 2016
        Windows 10 Version 1607 for x64-based Systems
        Windows 10 Version 1607 for 32-bit Systems
        Windows 10 for x64-based Systems
        Windows 10 for 32-bit Systems
        Windows Server 2025
        Windows 11 Version 24H2 for x64-based Systems
        Windows 11 Version 24H2 for ARM64-based Systems
        Windows Server 2022, 23H2 Edition (Server Core installation)
        Windows 11 Version 23H2 for x64-based Systems
        Windows 11 Version 23H2 for ARM64-based Systems
        Windows Server 2025 (Server Core installation)
        Windows 10 Version 22H2 for 32-bit Systems
        Windows 10 Version 22H2 for ARM64-based Systems
        Windows 10 Version 22H2 for x64-based Systems
        Windows 11 Version 22H2 for x64-based Systems
        Windows 11 Version 22H2 for ARM64-based Systems
        Windows 10 Version 21H2 for x64-based Systems
        Windows 10 Version 21H2 for ARM64-based Systems
        Windows 10 Version 21H2 for 32-bit Systems
        Windows Server 2022 (Server Core installation)
        Windows Server 2022
        Windows Server 2019 (Server Core installation)
        Windows Server 2019
        Windows 10 Version 1809 for x64-based Systems
        Windows 10 Version 1809 for 32-bit Systems
四、修复建议:
        目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
        https://msrc.microsoft.com/updat ... eleaseNote/2025-Feb



2 Windows辅助功能驱动程序的WinSock权限提升漏洞(CVE-2025-21418)
一、漏洞描述:
         Microsoft Windows.jpg
        Windows辅助功能驱动程序的WinSock中存在权限提升漏洞,由于Winsock的辅助函数驱动程序存在边界错误,经过身份 验证的本地攻击者可以触发堆缓冲区溢出,从而获得系统的SYSTEM权限。
二、风险等级:
        高
三、影响范围:
        Windows Server 2025 (Server Core installation)
        Windows Server 2025
        Windows Server 2022, 23H2 Edition (Server Core installation)
        Windows Server 2022 (Server Core installation)
        Windows Server 2022
        Windows Server 2019 (Server Core installation)
        Windows Server 2019
        Windows Server 2016 (Server Core installation)
        Windows Server 2016
        Windows Server 2012 R2 (Server Core installation)
        Windows Server 2012 R2
        Windows Server 2012 (Server Core installation)
        Windows Server 2012
        Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
        Windows Server 2008 R2 for x64-based Systems Service Pack 1
        Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
        Windows Server 2008 for x64-based Systems Service Pack 2
        Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
        Windows Server 2008 for 32-bit Systems Service Pack 2
        Windows 11 Version 24H2 for x64-based Systems
        Windows 11 Version 24H2 for ARM64-based Systems
        Windows 11 Version 23H2 for x64-based Systems
        Windows 11 Version 23H2 for ARM64-based Systems
        Windows 11 Version 22H2 for x64-based Systems
        Windows 11 Version 22H2 for ARM64-based Systems
        Windows 10 Version 22H2 for x64-based Systems
        Windows 10 Version 22H2 for ARM64-based Systems
        Windows 10 Version 22H2 for 32-bit Systems
        Windows 10 Version 21H2 for x64-based Systems
        Windows 10 Version 21H2 for ARM64-based Systems
        Windows 10 Version 21H2 for 32-bit Systems
        Windows 10 Version 1809 for x64-based Systems
        Windows 10 Version 1809 for 32-bit Systems
        Windows 10 Version 1607 for x64-based Systems
        Windows 10 Version 1607 for 32-bit Systems
        Windows 10 for x64-based Systems
        Windows 10 for 32-bit Systems
四、修复建议:
        目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
        https://msrc.microsoft.com/updat ... eleaseNote/2025-Feb



3 Microsoft Excel远程代码执行漏洞(CVE-2025-21381)
一、漏洞描述:
         Microsoft Office.jpg
        Microsoft Excel是微软公司为使用Windows和macOS操作系统的电脑编写的一款电子表格软件。Microsoft Excel存在远程代码执行漏洞,攻击者可利用该漏洞在目标主机上执行代码。
二、风险等级:
        高
三、影响范围:
        Microsoft Excel 2016 (64-bit editions)
        Microsoft Excel 2016 (32-bit editions)
        Microsoft Office LTSC for Mac 2024
        Microsoft Office LTSC for Mac 2021
        Microsoft Office LTSC 2024 for 64-bit editions
        Microsoft Office LTSC 2024 for 32-bit editions
        Microsoft Office LTSC 2021 for 64-bit editions
        Microsoft Office LTSC 2021 for 32-bit editions
        Microsoft Office Online Server
        Microsoft 365 Apps for Enterprise 64-bit Systems
        Microsoft 365 Apps for Enterprise 32-bit Systems
四、修复建议:
        目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
        https://portal.msrc.microsoft.co ... sory/CVE-2025-21381



4 Microsoft Edge (Chromium-based)远程代码执行漏洞(CVE-2025-21342)
一、漏洞描述:
         Microsoft Edge.jpg
        Microsoft Edge (Chromium-based)是微软基于Chromium内核的一款浏览器。Microsoft Edge (Chromium-based)存在远程代码执行漏洞,攻击者可利用该漏洞在目标主机上执行代码。
二、风险等级:
        高
三、影响范围:
        Microsoft Edge (Chromium-based)
四、修复建议:
        目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
        https://portal.msrc.microsoft.co ... sory/CVE-2025-21342


您需要登录后才可以回帖 登录 | 注册创意安天

本版积分规则

Archiver|手机版|小黑屋|创意安天 ( 京ICP备09068574,ICP证100468号。 )

GMT+8, 2025-3-9 22:29

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表