Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Eight critical RCE flaws make Microsoft’s latest Patch Tuesday list | Computer Weekly

By Computer Weekly by By Computer Weekly
August 12, 2025
Home Uncategorized
Share on FacebookShare on Twitter


No fewer than eight critical flaws that could allow a threat actor to achieve remote code execution (RCE) on a targeted system are listed in Microsoft’s August Patch Tuesday update, which once again tops out at over 100 common vulnerabilities and exposures (CVEs).

Alongside the critical RCE bugs, which occur in a variety of Microsoft products and services including DirectX Graphics Kernel, GDI+, Hyper-V, Message Queuing, Office and Word, are a solitary elevation of privilege (EoP) flaw in Windows NTLM, two information disclosure vulnerabilities in Hyper-V and Azure Stack Hub, and a spoofing vulnerability in Hyper-V.

The latest monthly drop contains no full zero-day exploits, bar one EoP vulnerability in Windows Kerberos, CVE-2025-53779, that by itself does not quite meet all the criteria as while exploit code has been made public, there is no evidence any threat actor has yet taken advantage of it.

This stems from a path traversal flaw in which Kerberos improperly validates path inputs when handling the relatively new delegated Managed Service Account (dMSA) feature in Windows Server 2025. This in turn enables an attacker to create improper delegation relationships, impersonate privileged accounts, escalate to domain admin privileges, and potentially gain control of the Active Directory domain.

However in order to do so they would need to already have elevated access to certain attributes of the dMSA, so exploitation is supposedly less likely, according to Microsoft.

This said, Mike Walters, president and co-founder of Action1, said the danger from CVE-2025-53779 grows when combined with other techniques and as such, large organisations with complex Active Directory environments, those that lean into dMSAs for service account management, and high-risk targets like banks, government agencies or hospitals, should take heed.

“The combination of a path traversal issue in a core authentication component like Kerberos and its potential high impact is concerning,” said Walters.

“The need for high privileges may create a false sense of security, as accounts with these rights are common in decentralised IT environments. Once compromised, they can quickly lead to full domain takeover. 

“The presence of functional exploit code means attackers may pursue this flaw despite Microsoft’s assessment. Vulnerabilities in core authentication mechanisms are attractive additions to advanced attack chains, especially in targeting high-value environments,” he warned.

SharePoint flaws should be addressed

Although less immediately dangerous in their scope, defenders may also wish to pay attention to a pair of vulnerabilities in SharePoint, CVE-2025-53760, which enables EoP, and CVE-2025-49712, which enables RCE.

These come hot on the heels of the so-called ToolShell vulnerabilities in SharePoint – which were so serious they received an out-of-synch patch in July, and were exploited in short-order by China-linked threat actors against government targets.

Qualys Threat Unit senior manager for security research, Saeed Abbasi, said CVE-2025-49712 in particular warranted some concern.

“This RCE demands authentication but pairs dangerously with known auth bypasses,” explained Abbasi.

“Attackers chaining this with prior flaws could achieve full server compromise, and data exfiltration. It’s not yet exploited in the wild, but history shows these evolve fast. Exposed SharePoint instances are prime footholds for lateral movement.

“Prioritise and patch all SharePoint updates, rotate keys, and eliminate internet exposure. Delaying invites regulatory scrutiny and breaches since SharePoint’s exploit streak isn’t over,” added Abbasi.



Source link

By Computer Weekly

By Computer Weekly

Next Post
Cineverse Technology Group’s Flagship Brand Matchpoint™ Announces New Deals for its Proprietary Streaming Supply Chain Platform

Cineverse Technology Group's Flagship Brand Matchpoint™ Announces New Deals for its Proprietary Streaming Supply Chain Platform

Recommended.

Ralph Lauren anoints global chief digital officer

Ralph Lauren anoints global chief digital officer

May 7, 2025
WOTC West 2025: Pearls Of Wisdom On Combatting Data Overload, Authenticity and Being a ‘Fixer’

WOTC West 2025: Pearls Of Wisdom On Combatting Data Overload, Authenticity and Being a ‘Fixer’

May 15, 2025

Trending.

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

July 18, 2025
Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

September 4, 2025
Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio