Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server

Posted on July 9, 2025July 9, 2025 By CWS

Microsoft has launched important safety updates to deal with CVE-2025-47981, a extreme heap-based buffer overflow vulnerability within the SPNEGO Prolonged Negotiation (NEGOEX) Safety Mechanism that impacts a number of Home windows and Home windows Server variations. 

This vulnerability carries a CVSS rating of 9.8 out of 10, indicating most severity with the potential for distant code execution with out consumer interplay. 

Key Takeaways1. Heap-based buffer overflow vulnerability in Home windows SPNEGO with 9.8/10 CVSS rating enabling distant code execution.2. Attackers can execute code by sending malicious messages to servers with out consumer interplay or privileges.3. Impacts Home windows 10 (1607+), Home windows 11, and Home windows Server variations throughout 33 system configurations.4. Microsoft launched updates July 8, 2025 – prioritize deployment on internet-facing methods and area controllers.

The flaw permits unauthorized attackers to execute arbitrary code over community connections, making it significantly harmful for enterprise environments.

Wormable RCE Vulnerability (CVE-2025-47981)

The vulnerability resides in Home windows SPNEGO Prolonged Negotiation, which extends the Easy and Protected GSS-API Negotiation Mechanism. 

CVE-2025-47981 is assessed as CWE-122, representing a heap-based buffer overflow weak point that may be exploited remotely. 

The CVSS vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C signifies network-based assaults with low complexity, requiring no privileges or consumer interplay, whereas offering excessive affect to confidentiality, integrity, and availability.

Safety researchers have assessed this vulnerability as “Exploitation Extra Probably,” although no public exploits or lively exploitation have been reported on the time of disclosure. 

The vulnerability significantly impacts Home windows shopper machines working Home windows 10 model 1607 and above, the place the Group Coverage Object “Community safety: Permit PKU2U authentication requests to this laptop to make use of on-line identities” is enabled by default.

Attackers can exploit CVE-2025-47981 by sending malicious messages to affected servers, doubtlessly reaching distant code execution capabilities. 

The heap-based buffer overflow happens inside the NEGOEX processing mechanism, permitting attackers to overwrite reminiscence constructions and acquire management of program execution movement. 

This wormable attribute means the vulnerability may doubtlessly propagate throughout network-connected methods with out requiring consumer intervention.

The vulnerability was found via coordinated disclosure by safety researchers, together with nameless contributors and Yuki Chen. 

Microsoft’s acknowledgment of those researchers demonstrates the significance of accountable vulnerability disclosure in sustaining enterprise safety postures.

Threat FactorsDetailsAffected Merchandise– Home windows 10 (variations 1607 and above)- Home windows 11 (variations 23H2, 24H2)- Home windows Server 2008 R2 via Server 2025- Each x64, x86, and ARM64 architectures- Server Core installations includedImpactRemote Code ExecutionExploit PrerequisitesNo privileges, consumer interplay required CVSS 3.1 Score9.8 (Essential)

Patch Deployment

Microsoft launched complete safety updates on July 8, 2025, addressing the vulnerability throughout completely different Home windows configurations. 

Essential updates embody patches for Home windows Server 2025 (construct 10.0.26100.4652), Home windows 11 Model 24H2 (construct 10.0.26100.4652), Home windows Server 2022 23H2 Version (construct 10.0.25398.1732), and legacy methods together with Home windows Server 2008 R2 (construct 6.1.7601.27820).

Organizations ought to prioritize the instant deployment of those safety updates, significantly for internet-facing methods and area controllers.

The patches can be found via Home windows Replace, Microsoft Replace Catalog, and Home windows Server Replace Providers (WSUS). 

System directors ought to confirm profitable set up by checking construct numbers in opposition to Microsoft’s safety bulletin and think about implementing community segmentation as an extra defensive measure whereas patches are deployed.

Suppose like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now

Cyber Security News Tags:Microsoft, Patches, RCE, Server, Vulnerability, Windows, Wormable

Post navigation

Previous Post: VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack
Next Post: Reflectiz Now Available on the Datadog Marketplace

Related Posts

AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks Cyber Security News
New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware Cyber Security News
UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled Cyber Security News
Microsoft Details Scattered Spider TTPs Observed in Recent Attack Chains Cyber Security News
New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors Cyber Security News
UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date
  • Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
  • Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day
  • CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
  • Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date
  • Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks
  • Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day
  • CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
  • Authorities Seize BreachForums New Clearnet Cybercrime Marketplace Domain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News