一、漏洞概述
4月9日,绿盟科技CERT监测到微软发布4月安全更新补丁,修复了126个安全问题,涉及Windows、Microsoft Office、Azure、Microsoft Edge for iOS、Microsoft Visual Studio等广泛使用的产品,其中包括权限提升、远程代码执行等高危漏洞类型。
本月微软月度更新修复的漏洞中,严重程度为关键(Critical)的漏洞有11个,重要(Important)漏洞有112个。其中包括1个已检测到在野利用的漏洞:
Windows通用日志文件系统驱动程序权限提升漏洞(CVE-2025-29824)
请相关用户尽快更新补丁进行防护,完整漏洞列表请参考附录。
参考链接:
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-Apr
二、重点漏洞简述
根据产品流行度和漏洞重要性筛选出此次更新中包含影响较大的漏洞,请相关用户重点进行关注:
Windows通用日志文件系统驱动程序权限提升漏洞(CVE-2025-29824):
Windows通用日志文件系统驱动程序中存在权限提升漏洞。由于Windows Common Log File System驱动程序中存在释放后重用错误,经过身份验证的本地攻击者可以通过该漏洞获取SYSTEM权限。该漏洞已存在在野利用,CVSS评分7.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824
Microsoft SharePoint远程代码执行漏洞(CVE-2025-29794):
Microsoft SharePoint存在远程代码执行漏洞。由于Microsoft Office SharePoint中的不当授权,经过身份验证的远程攻击者可以通过该漏洞执行任意代码。CVSS评分8.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29794
Windows远程桌面服务远程代码执行漏洞(CVE-2025-27480、CVE-2025-27482):
Windows远程桌面服务存在远程代码执行漏洞。由于Windows远程桌面服务中存在释放后重用和内存锁定不当漏洞,未经身份验证的攻击者可以通过连接到具有远程桌面网关角色的系统,触发争用条件以创建释放后使用场景,从而在系统上执行任意代码。CVSS评分8.1。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27480
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27482
Windows轻量级目录访问协议 (LDAP) 客户端远程代码执行漏洞(CVE-2025-26670、CVE-2025-26663):
Windows轻量级目录访问协议 (LDAP) 客户端存在远程代码执行漏洞。由于轻量级目录访问协议(LDAP)客户端存在释放后重用错误,未经身份验证的攻击者可以按顺序向易受攻击的 LDAP 服务器发送特制请求,从而实现远程代码执行。CVSS评分8.1。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26670
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26663
Microsoft Excel 远程代码执行漏洞(CVE-2025-27752):
Microsoft Excel 远程代码执行漏洞。由于Microsoft Office Excel中存在基于堆的缓冲区溢出,未经身份验证的远程攻击者可以在本地执行代码。CVSS评分7.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27752
Windows Kerberos权限提升漏洞(CVE-2025-26647):
Windows Kerberos存在权限提升漏洞。由于Windows Kerberos中不正确的输入验证,未经身份验证的攻击者可以通过入侵受信任的证书颁发机构(CA)并签发具有特定SKI值的证书来冒充其他账户身份,从而实现权限提升。CVSS评分8.1。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26647
Windows路由和远程访问服务(RRAS)信息泄漏漏洞(CVE-2025-26669):
Windows路由和远程访问服务(RRAS)存在信息泄漏漏洞。由于Windows 路由和远程访问服务(RRAS)中存在越界读取,未经身份验证的攻击者通过诱骗用户向恶意服务器发送请求来利用此漏洞,从而在目标系统上执行任意代码。CVSS评分8.8。
官方通告链接:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26669
三、影响范围
以下为部分重点关注漏洞的受影响产品版本,其他漏洞影响产品范围请参阅官方通告链接。
| 漏洞编号 | 受影响产品版本 |
| CVE-2025-26663 CVE-2025-26670 CVE-2025-29824 CVE-2025-26669
| Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows 11 Version 24H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 for 32-bit Systems |
| CVE-2025-27752
| Microsoft Office LTSC for Mac 2024 Microsoft Office LTSC for Mac 2021 Microsoft Office LTSC 2024 for 64-bit editions Microsoft Office LTSC 2024 for 32-bit editions Microsoft Office LTSC 2021 for 64-bit editions Microsoft Office LTSC 2021 for 32-bit editions Microsoft Office 2019 for 64-bit editions Microsoft Office 2019 for 32-bit editions Microsoft Office 2016 (64-bit edition) Microsoft Office 2016 (32-bit edition) Microsoft 365 Apps for Enterprise for 64-bit Systems Microsoft 365 Apps for Enterprise for 32-bit Systems |
| CVE-2025-27480 | Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 |
| CVE-2025-27482 | Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 |
| CVE-2025-29794 | Microsoft SharePoint Server Subscription Edition Microsoft SharePoint Server 2019 Microsoft SharePoint Enterprise Server 2016 |
| CVE-2025-26647 | Windows Server 2025 (Server Core installation) Windows Server 2025 Windows Server 2022, 23H2 Edition (Server Core installation) Windows Server 2022 (Server Core installation) Windows Server 2022 Windows Server 2019 (Server Core installation) Windows Server 2019 Windows Server 2016 (Server Core installation) Windows Server 2016 Windows Server 2012 R2 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 (Server Core installation) Windows Server 2012 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 |
四、漏洞防护
补丁更新
目前微软官方已针对受支持的产品版本发布了修复以上漏洞的安全补丁,强烈建议受影响用户尽快安装补丁进行防护,官方下载链接:
https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr
注:由于网络问题、计算机环境问题等原因,Windows Update的补丁更新可能出现失败。用户在安装补丁后,应及时检查补丁是否成功更新。
右键点击Windows图标,选择“设置(N)”,选择“更新和安全”-“Windows更新”,查看该页面上的提示信息,也可点击“查看更新历史记录”查看历史更新情况。
针对未成功安装的更新,可点击更新名称跳转到微软官方下载页面,建议用户点击该页面上的链接,转到“Microsoft更新目录”网站下载独立程序包并安装。
文章来源:https://blog.nsfocus.net/windows-4/
- 上一篇:无
- 下一篇:NEXT.JS中间件权限绕过漏洞 (CVE-2025-29927)
豫公网安备 41082302410884号