Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server

Posted on July 9, 2025July 9, 2025 By CWS

Microsoft has launched important safety updates to deal with CVE-2025-47981, a extreme heap-based buffer overflow vulnerability within the SPNEGO Prolonged Negotiation (NEGOEX) Safety Mechanism that impacts a number of Home windows and Home windows Server variations. 

This vulnerability carries a CVSS rating of 9.8 out of 10, indicating most severity with the potential for distant code execution with out consumer interplay. 

Key Takeaways1. Heap-based buffer overflow vulnerability in Home windows SPNEGO with 9.8/10 CVSS rating enabling distant code execution.2. Attackers can execute code by sending malicious messages to servers with out consumer interplay or privileges.3. Impacts Home windows 10 (1607+), Home windows 11, and Home windows Server variations throughout 33 system configurations.4. Microsoft launched updates July 8, 2025 – prioritize deployment on internet-facing methods and area controllers.

The flaw permits unauthorized attackers to execute arbitrary code over community connections, making it significantly harmful for enterprise environments.

Wormable RCE Vulnerability (CVE-2025-47981)

The vulnerability resides in Home windows SPNEGO Prolonged Negotiation, which extends the Easy and Protected GSS-API Negotiation Mechanism. 

CVE-2025-47981 is assessed as CWE-122, representing a heap-based buffer overflow weak point that may be exploited remotely. 

The CVSS vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C signifies network-based assaults with low complexity, requiring no privileges or consumer interplay, whereas offering excessive affect to confidentiality, integrity, and availability.

Safety researchers have assessed this vulnerability as “Exploitation Extra Probably,” although no public exploits or lively exploitation have been reported on the time of disclosure. 

The vulnerability significantly impacts Home windows shopper machines working Home windows 10 model 1607 and above, the place the Group Coverage Object “Community safety: Permit PKU2U authentication requests to this laptop to make use of on-line identities” is enabled by default.

Attackers can exploit CVE-2025-47981 by sending malicious messages to affected servers, doubtlessly reaching distant code execution capabilities. 

The heap-based buffer overflow happens inside the NEGOEX processing mechanism, permitting attackers to overwrite reminiscence constructions and acquire management of program execution movement. 

This wormable attribute means the vulnerability may doubtlessly propagate throughout network-connected methods with out requiring consumer intervention.

The vulnerability was found via coordinated disclosure by safety researchers, together with nameless contributors and Yuki Chen. 

Microsoft’s acknowledgment of those researchers demonstrates the significance of accountable vulnerability disclosure in sustaining enterprise safety postures.

Threat FactorsDetailsAffected Merchandise– Home windows 10 (variations 1607 and above)- Home windows 11 (variations 23H2, 24H2)- Home windows Server 2008 R2 via Server 2025- Each x64, x86, and ARM64 architectures- Server Core installations includedImpactRemote Code ExecutionExploit PrerequisitesNo privileges, consumer interplay required CVSS 3.1 Score9.8 (Essential)

Patch Deployment

Microsoft launched complete safety updates on July 8, 2025, addressing the vulnerability throughout completely different Home windows configurations. 

Essential updates embody patches for Home windows Server 2025 (construct 10.0.26100.4652), Home windows 11 Model 24H2 (construct 10.0.26100.4652), Home windows Server 2022 23H2 Version (construct 10.0.25398.1732), and legacy methods together with Home windows Server 2008 R2 (construct 6.1.7601.27820).

Organizations ought to prioritize the instant deployment of those safety updates, significantly for internet-facing methods and area controllers.

The patches can be found via Home windows Replace, Microsoft Replace Catalog, and Home windows Server Replace Providers (WSUS). 

System directors ought to confirm profitable set up by checking construct numbers in opposition to Microsoft’s safety bulletin and think about implementing community segmentation as an extra defensive measure whereas patches are deployed.

Suppose like an Attacker, Mastering Endpoint Safety With Marcus Hutchins – Register Now

Cyber Security News Tags:Microsoft, Patches, RCE, Server, Vulnerability, Windows, Wormable

Post navigation

Previous Post: VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack
Next Post: Reflectiz Now Available on the Datadog Marketplace

Related Posts

CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation Cyber Security News
VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes Cyber Security News
North Korean Hackers Trick Users With Weaponized Zoom Apps to Execute System-Takeover Commands Cyber Security News
Threat Actors Weaponizes AI Generated Summaries With Malicious Payload to Execute Ransomware Cyber Security News
ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words Cyber Security News
Top 5 Best Cybersecurity Companies Leading The Industry Right Now in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand Cyber Insurance Policies
  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand Cyber Insurance Policies
  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News