Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image

Posted on November 20, 2025November 20, 2025 By CWS

A essential distant code execution flaw in Microsoft’s Home windows Graphics Element permits attackers to grab management of techniques utilizing specifically crafted JPEG photographs.

With a CVSS rating of 9.8, this vulnerability poses a extreme risk to Home windows customers worldwide, because it requires no person interplay for exploitation.

Found in Could 2025 and patched by Microsoft on August 12, 2025, the problem stems from an untrusted pointer dereference within the windowscodecs.dll library, affecting core picture processing capabilities.​

Attackers can embed the malicious JPEG in on a regular basis recordsdata like Microsoft Workplace paperwork, enabling silent compromise when the file is opened or previewed.

This flaw highlights ongoing dangers in legacy graphics dealing with, the place seemingly innocuous picture decoding can lead to a whole system takeover. As Home windows powers billions of units, unpatched techniques stay extremely uncovered to phishing campaigns or drive-by downloads.​

Zscaler ThreatLabz recognized the vulnerability by focused fuzzing of the Home windows Imaging Element, specializing in JPEG encoding and decoding paths in windowscodecs.dll.

The entry level for exploitation lies within the GpReadOnlyMemoryStream::InitFile perform, the place manipulated buffer sizes enable attackers to manage reminiscence snapshots throughout file mapping.

Fuzzing revealed a crash triggered by dereferencing an uninitialized pointer at jpeg_finish_compress+0xcc, exposing user-controllable knowledge by way of heap spraying.​

Stack traces from WinDbg evaluation pointed to key capabilities like CJpegTurboFrameEncode::HrWriteSource and CFrameEncodeBase::WriteSource, confirming the flaw in JPEG metadata encoding processes.

This uninitialized useful resource concern permits arbitrary code execution with out privileges, making it exploitable over networks. Microsoft confirmed the vulnerability impacts automated picture rendering in purposes reliant on the Graphics Element.​

Affected Variations and Patching

The vulnerability impacts current Home windows releases, significantly these utilizing weak builds of windowscodecs.dll. Organizations should prioritize updates to mitigate dangers, as exploitation may chain with different assaults for lateral motion in networks.

ProductImpacted VersionPatched VersionWindows Server 202510.0.26100.485110.0.26100.4946Windows 11 Model 24H2 (x64)10.0.26100.485110.0.26100.4946Windows 11 Model 24H2 (ARM64)10.0.26100.485110.0.26100.4946Windows Server 2025 (Core)10.0.26100.485110.0.26100.4946

Exploitation Mechanics and Proof-of-Idea

Exploiting CVE-2025-50165 includes crafting a JPEG that triggers the pointer dereference throughout decoding, typically by way of embedded recordsdata in Workplace or third-party apps.

For 64-bit techniques, attackers bypass Management Move Guard utilizing Return-Oriented Programming (ROP) chains in sprayed heap chunks of dimension 0x3ef7. This pivots execution by creating read-write-execute reminiscence with VirtualAlloc and loading shellcode for persistent entry.​

Home windows Graphics Vulnerability Exploit

Zscaler’s proof-of-concept demonstrates heap manipulation by an instance app that allocates, frees, and processes Base64-encoded JPEGs, attaining RIP management.

Whereas no in-the-wild exploits have been reported, the low complexity and broad community attain make it a major goal for ransomware or espionage. CFG is disabled by default in 32-bit variations, easing assaults on older setups.​

Customers ought to instantly apply the August 2025 Patch Tuesday updates by way of Home windows Replace, concentrating on high-value property first. Disable automated picture previews in e-mail shoppers and implement sandboxing for untrusted recordsdata. Zscaler has carried out cloud-based protections to dam exploit makes an attempt.​

This incident underscores the perils of unpatched graphics libraries in enterprise environments, the place JPEGs are ubiquitous in workflows.

As risk actors evolve techniques, well timed patching stays the strongest protection towards such pixel-perfect poisons. With no noticed energetic exploitation but, proactive measures can stop widespread harm.​

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Control, Critical, Graphics, Hackers, Image, Lets, Seize, Single, Vulnerability, Windows

Post navigation

Previous Post: New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
Next Post: Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

Related Posts

CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks Cyber Security News
Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Major Under Armour Breach Cyber Security News
Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Cyber Security News
Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News
New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records Cyber Security News
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
  • Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
  • Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image
  • New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
  • Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
  • Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
  • Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image
  • New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
  • Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News