{"id":2258,"date":"2025-08-13T08:52:28","date_gmt":"2025-08-13T08:52:28","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2025\/08\/13\/microsoft-fixes-over-100-cves-on-august-patch-tuesday\/"},"modified":"2025-08-13T08:52:28","modified_gmt":"2025-08-13T08:52:28","slug":"microsoft-fixes-over-100-cves-on-august-patch-tuesday","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2025\/08\/13\/microsoft-fixes-over-100-cves-on-august-patch-tuesday\/","title":{"rendered":"Microsoft Fixes Over 100 CVEs on August Patch Tuesday"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"https:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Microsoft fixed one publicly disclosed zero-day bug in SQL Server yesterday, alongside over 100 additional CVEs, making it one of the biggest Patch Tuesdays so far in 2025.<\/p>\n<p>This year has been notable for the number of zero-days addressed by the tech giant, although in cases like this one, the term refers to a publicly disclosed rather than actively exploited vulnerability.<\/p>\n<p>The flaw in question, CVE-2025-53779, is an elevation of privileges (EoP) vulnerability in Windows Kerberos which could allow an authenticated attacker to gain domain admin privileges.<\/p>\n<p>It relates to delegated Managed Service Accounts (dMSAs), which are designed to allow for migration from traditional service accounts to machine accounts.<\/p>\n<p>\u201cMicrosoft\u2019s motivation is unimpeachable: the dMSA supports automated rotation of credentials for service accounts, and is specifically designed to prevent credential harvesting using\u00a0Kerberoasting. Indeed,\u00a0CISA has described Kerberoasting\u00a0as one of the most time-efficient ways to elevate privileges and move laterally throughout an organization\u2019s network,\u201d explained Adam Barnett, lead software engineer at\u00a0Rapid7.<\/p>\n<p>\u201cThe good news here is that successful exploitation of\u00a0CVE-2025-53779\u00a0requires an attacker to have pre-existing control of two attributes of the hopefully well protected dMSA:\u00a0msds-groupMSAMembership, which determines which users may use credentials for the managed service account, and\u00a0msds-ManagedAccountPrecededByLink, which contains a list of users on whose behalf the dMSA can act.\u201d<\/p>\n<p><em>Read more on Patch Tuesday: Microsoft Patches a Whopping Seven Zero-Days in March<\/em><\/p>\n<p>That zero-day is one of only two vulnerabilities classed as \u201cmoderate\u201d this Patch Tuesday. Elsewhere, there are 13 marked \u201ccritical,\u201d\u00a0nine of which are remote code execution (RCE) vulnerabilities, three that are information disclosure bugs\u00a0and one EoP flaw.<\/p>\n<p>Nine fall under the \u201cexploitation more likely\u201d category of Microsoft\u2019s Exploitability Index.<\/p>\n<p>\u201cWhat this means is that adversaries could potentially develop reliable exploits for these vulnerabilities, and, further, that these are the kinds of vulnerabilities that adversaries have targeted in the past,\u201d explained Red Canary principal researcher, Brian Donohue.<\/p>\n<p>He urged sysadmins to focus on patching the following:<\/p>\n<ul>\n<li>CVE-2025-53778: A critical-rated improper authentication bug in Windows NTLM that\u00a0allows an authorized attacker to elevate privileges over a network<\/li>\n<li>CVE-2025-50177: A critical use-after-free bug in Windows Message Queuing that allows an unauthorized attacker to execute code over a network<\/li>\n<li>CVE-2025-53132: An important-rated race condition in Windows Win32K &#8211; GRFX that could allow an authorized attacker to elevate privileges over a network<\/li>\n<\/ul>\n<p>Aside from July\u2019s Patch Tuesday haul, no other month this year has seen Microsoft address over 100 CVEs.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft fixed one publicly disclosed zero-day bug in SQL Server yesterday, alongside over 100 additional CVEs, making it one of the biggest Patch Tuesdays so far in 2025. This year has been notable for the number of zero-days addressed by the tech giant, although in cases like this one, the term refers to a publicly<\/p>\n","protected":false},"author":2,"featured_media":2259,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2258","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/08\/2258-d64f44d8-72d7-4f89-a848-9c1a0436acab-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=2258"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/2258\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/2259"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=2258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=2258"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=2258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}