• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Microsoft targets 130 vulnerabilities on July Patch Tuesday

Admin by Admin
July 9, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Microsoft addressed 130 distinctive new CVEs this month — one of many bigger Patch Tuesday releases of late — however admins don’t have any urgent zero-day vulnerabilities to sort out.

Of the brand new vulnerabilities, there have been 14 CVEs rated vital, 115 rated vital and one labeled average. As common, most vulnerabilities are within the Home windows OS, with a mixture of flaws affecting Azure, Microsoft Workplace and Hyper-V. Microsoft additionally republished seven CVEs and included fixes for 10 non-Microsoft merchandise, together with ones that have an effect on libraries in Visible Studio. There’s one public disclosure in SQL Server (CVE-2025-49719).

Microsoft Workplace and RRAS vulnerabilities take priority

This month, admins must deal with releasing Home windows cumulative updates shortly, notably since a excessive focus of vulnerabilities have an effect on Home windows Routing and Distant Entry Service, with 16 whole. All of the RRAS CVEs have a most severity of vital and an exploitability evaluation of exploitation unlikely.

RRAS in Home windows Server handles community site visitors management and distant connectivity on private and non-private networks, offering compatibility with a number of VPN protocols and making certain safe distant entry.

A lot of the danger sorts are distant code execution, with two within the info disclosure menace class.

“The vulnerabilities are all remotely exploitable with out the necessity for authentication over the community,” mentioned Chris Goettl, vice chairman of product administration for safety merchandise at Ivanti.

He mentioned the next mitigations may curb assaults on RRAS:

  • Restrict RRAS ports to trusted networks or VPN concentrators.
  • Apply strict firewall guidelines to RRAS ports.
  • Disable unused options in RRAS or decide whether or not the service could be eliminated completely.

Microsoft Workplace additionally had 16 whole CVEs, with six rated vital and the remainder vital. Six vulnerabilities have an effect on the core Microsoft Workplace platform, plus two in Excel, one in PowerPoint, three in SharePoint, three in Microsoft Phrase and one within the Microsoft Workplace Developer Platform.

Admins will wish to deal with the CVEs rated extra prone to be exploited:

  • CVE-2025-49695: Microsoft Workplace distant code execution vulnerability, 8.4 CVSS, vital ranking.
  • CVE-2025-49696: Microsoft Workplace distant code execution vulnerability, 8.4 CVSS, vital ranking.
  • CVE-2025-49701: Microsoft Workplace SharePoint distant code execution vulnerability, 8.8 CVSS, vital ranking.
  • CVE-2025-49704: Microsoft Workplace SharePoint distant code execution vulnerability, 8.8 CVSS, vital ranking.

The preview pane is a possible assault vector for CVE-2025-49695 and CVE-2025-49696, which means that customers solely have to preview a malicious file to set off the exploit.

Patches for 7 CVEs associated to Visible Studio launched

Admins who work with growth groups might want to be sure that seven vulnerabilities — CVE-2025-27613, CVE-2025-27614, CVE-2025-46334, CVE-2025-46835, CVE-2025-48384, CVE-2025-48385 and CVE-2025-48386 — associated to Git are addressed by updating to the newest model of Visible Studio.

Common updates to those third-party libraries are essential to stop the gradual accumulation of safety debt and preserve compliance with service-level agreements, in response to Goettl.

“Most growth organizations, in the event that they’re doing CI/CD pipeline evaluation, are going to see vulnerabilities within the third-party libraries and growth instruments they’re utilizing,” he mentioned.

Goettl mentioned the tactic to check fixes for developer instruments relies on the scale of the group. Smaller ones depend on regression testing with the brand new libraries put in to run validation checks. Bigger organizations sometimes use a staged rollout, beginning with the lower-risk environments earlier than updating the extra vital methods.

“It is fairly a bit completely different than simply an automatic patch administration technique of OS updates and third-party updates while you’re coping with the event facet. There is a bit extra of a heavy carry to validate that every little thing is nice,” Goettl mentioned.

Different safety updates of observe for July Patch Tuesday

  • Two Azure-related CVEs will solely require admin intervention if auto-update performance will not be enabled. An Azure Service Cloth runtime elevation-of-privilege vulnerability (CVE-2025-21195) has a CVSS ranking of 6.0. An Azure Monitor Agent distant code execution vulnerability (CVE-2025-47988) has a 7.5 CVSS ranking.
  • Microsoft corrected a difficulty stemming from its June Patch Tuesday safety updates that brought on Dynamic Host Configuration Protocol (DHCP) issues with Home windows Server. The affected Home windows Server methods and their Information Base articles are Home windows Server 2025 (KB5060842), Home windows Server 2022 (KB5060526), Home windows Server 2019 (KB5060531) and Home windows Server 2016 (KB5061010). DHCP robotically assigns IP addresses to gadgets on a community and manages IP tackle leases.
  • Microsoft republished a June Patch Tuesday repair for a .NET and Visible Studio distant code execution vulnerability (CVE-2025-30399) that was expanded to incorporate PowerShell 7.4 and seven.5. “An attacker may exploit this vulnerability by inserting information specifically places, resulting in unintended code execution,” in response to Microsoft’s safety advisory. The vulnerability is especially important as a result of it impacts Home windows, macOS and Linux methods that run these exploitable PowerShell variations.

Subsequent section of Kerberos hardening course of takes impact

July Patch Tuesday additionally applied the subsequent stage within the three-phase course of to enhance safety for Kerberos authentication to forestall machine-in-the-middle assaults and native community spoofing.

On April Patch Tuesday, Microsoft first addressed a Home windows Kerberos elevation-of-privilege vulnerability (CVE-2025-26647) in Home windows Server methods and launched Audit mode to uncover noncompliant certificates. Admins had been anticipated to make use of Audit logs to search out these certificates, make corrections and verify for points.

July Patch Tuesday’s launch launched the second section, Enforced by Default, to area controllers. This replace makes checks to the NTAuth retailer — the repository on Home windows area controllers that comprises an inventory of trusted certificates authorities — obligatory, however admins can quickly revert to Audit mode for changes.

After the October Patch Tuesday updates, Microsoft will put area controllers in Enforcement mode and take away the flexibility to allow these registry bypasses.

Tom Walat is the positioning editor for Informa TechTarget’s SearchWindowsServer web site.

Tags: JulyMicrosoftPatchtargetsTuesdayVulnerabilities
Admin

Admin

Next Post
Constructing A 300 Channel Video Encoding Server — SitePoint

Constructing A 300 Channel Video Encoding Server — SitePoint

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

The way it preys on private knowledge – and methods to keep secure

The way it preys on private knowledge – and methods to keep secure

January 9, 2026
Tips on how to Advocate for Trans Rights in Your Neighborhood

Tips on how to Advocate for Trans Rights in Your Neighborhood

June 8, 2025

Trending.

The right way to Defeat Imagawa Tomeji

The right way to Defeat Imagawa Tomeji

September 28, 2025
How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

Satellite tv for pc Navigation Methods Going through Rising Jamming and Spoofing Assaults

March 26, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
The most effective methods to take notes for Blue Prince, from Blue Prince followers

The most effective methods to take notes for Blue Prince, from Blue Prince followers

April 20, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Infinity Nikki ushers within the 12 months of the Horse with… a deer-themed Model 2.2

Infinity Nikki ushers within the 12 months of the Horse with… a deer-themed Model 2.2

February 1, 2026
My Tackle the Finest Cloud Compliance Software program for 2026 on G2

My Tackle the Finest Cloud Compliance Software program for 2026 on G2

February 1, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved