欢迎访问本网站!搜索学校主页
当前位置: 首页 >> 网络安全 >> 漏洞预警
微软4月安全更新多个产品高危漏洞通告
发布日期:2025-04-11   浏览量:

一、漏洞概述

4月9日,绿盟科技CERT监测到微软发布4月安全更新补丁,修复了126个安全问题,涉及Windows、Microsoft Office、Azure、Microsoft Edge for iOS、Microsoft Visual Studio等广泛使用的产品,其中包括权限提升、远程代码执行等高危漏洞类型。

本月微软月度更新修复的漏洞中,严重程度为关键(Critical)的漏洞有11个,重要(Important)漏洞有112个。其中包括1个已检测到在野利用的漏洞:

Windows通用日志文件系统驱动程序权限提升漏洞(CVE-2025-29824)

请相关用户尽快更新补丁进行防护,完整漏洞列表请参考附录。

 

参考链接:

https://msrc.microsoft.com/update-guide/en-us/releaseNote/2025-Apr

 

二、重点漏洞简述

根据产品流行度和漏洞重要性筛选出此次更新中包含影响较大的漏洞,请相关用户重点进行关注:

Windows通用日志文件系统驱动程序权限提升漏洞(CVE-2025-29824):

Windows通用日志文件系统驱动程序中存在权限提升漏洞。由于Windows Common Log File System驱动程序中存在释放后重用错误,经过身份验证的本地攻击者可以通过该漏洞获取SYSTEM权限。该漏洞已存在在野利用,CVSS评分7.8。

官方通告链接:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824

 

Microsoft SharePoint远程代码执行漏洞(CVE-2025-29794):

Microsoft SharePoint存在远程代码执行漏洞。由于Microsoft Office SharePoint中的不当授权,经过身份验证的远程攻击者可以通过该漏洞执行任意代码。CVSS评分8.8。

官方通告链接:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29794

 

Windows远程桌面服务远程代码执行漏洞(CVE-2025-27480、CVE-2025-27482):

Windows远程桌面服务存在远程代码执行漏洞。由于Windows远程桌面服务中存在释放后重用和内存锁定不当漏洞,未经身份验证的攻击者可以通过连接到具有远程桌面网关角色的系统,触发争用条件以创建释放后使用场景,从而在系统上执行任意代码。CVSS评分8.1。

官方通告链接:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27480

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27482

 

Windows轻量级目录访问协议 (LDAP) 客户端远程代码执行漏洞(CVE-2025-26670、CVE-2025-26663):

Windows轻量级目录访问协议 (LDAP) 客户端存在远程代码执行漏洞。由于轻量级目录访问协议(LDAP)客户端存在释放后重用错误,未经身份验证的攻击者可以按顺序向易受攻击的 LDAP 服务器发送特制请求,从而实现远程代码执行。CVSS评分8.1。

官方通告链接:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26670

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26663

 

Microsoft Excel 远程代码执行漏洞(CVE-2025-27752):

Microsoft Excel 远程代码执行漏洞。由于Microsoft Office Excel中存在基于堆的缓冲区溢出,未经身份验证的远程攻击者可以在本地执行代码。CVSS评分7.8。

官方通告链接:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27752

 

Windows Kerberos权限提升漏洞(CVE-2025-26647):

Windows Kerberos存在权限提升漏洞。由于Windows Kerberos中不正确的输入验证,未经身份验证的攻击者可以通过入侵受信任的证书颁发机构(CA)并签发具有特定SKI值的证书来冒充其他账户身份,从而实现权限提升。CVSS评分8.1。

官方通告链接:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26647

 

Windows路由和远程访问服务(RRAS)信息泄漏漏洞(CVE-2025-26669):

Windows路由和远程访问服务(RRAS)存在信息泄漏漏洞。由于Windows 路由和远程访问服务(RRAS)中存在越界读取,未经身份验证的攻击者通过诱骗用户向恶意服务器发送请求来利用此漏洞,从而在目标系统上执行任意代码。CVSS评分8.8。

官方通告链接:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26669

 

三、影响范围

以下为部分重点关注漏洞的受影响产品版本,其他漏洞影响产品范围请参阅官方通告链接。

漏洞编号受影响产品版本
CVE-2025-26663


CVE-2025-26670

CVE-2025-29824

CVE-2025-26669

 

Windows Server 2025 (Server Core installation)


Windows Server 2025

Windows Server 2022, 23H2 Edition (Server Core installation)

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows 11 Version 24H2 for x64-based Systems

Windows 11 Version 24H2 for ARM64-based Systems

Windows 11 Version 23H2 for x64-based Systems

Windows 11 Version 23H2 for ARM64-based Systems

Windows 11 Version 22H2 for x64-based Systems

Windows 11 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for x64-based Systems

Windows 10 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for 32-bit Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 for 32-bit Systems

CVE-2025-27752


 

Microsoft Office LTSC for Mac 2024


Microsoft Office LTSC for Mac 2021

Microsoft Office LTSC 2024 for 64-bit editions

Microsoft Office LTSC 2024 for 32-bit editions

Microsoft Office LTSC 2021 for 64-bit editions

Microsoft Office LTSC 2021 for 32-bit editions

Microsoft Office 2019 for 64-bit editions

Microsoft Office 2019 for 32-bit editions

Microsoft Office 2016 (64-bit edition)

Microsoft Office 2016 (32-bit edition)

Microsoft 365 Apps for Enterprise for 64-bit Systems

Microsoft 365 Apps for Enterprise for 32-bit Systems

CVE-2025-27480Windows Server 2025 (Server Core installation)


Windows Server 2025

Windows Server 2022, 23H2 Edition (Server Core installation)

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

CVE-2025-27482Windows Server 2025 (Server Core installation)


Windows Server 2025

Windows Server 2022, 23H2 Edition (Server Core installation)

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows Server 2016 (Server Core installation)

Windows Server 2016

CVE-2025-29794Microsoft SharePoint Server Subscription Edition


Microsoft SharePoint Server 2019

Microsoft SharePoint Enterprise Server 2016

CVE-2025-26647Windows Server 2025 (Server Core installation)


Windows Server 2025

Windows Server 2022, 23H2 Edition (Server Core installation)

Windows Server 2022 (Server Core installation)

Windows Server 2022

Windows Server 2019 (Server Core installation)

Windows Server 2019

Windows Server 2016 (Server Core installation)

Windows Server 2016

Windows Server 2012 R2 (Server Core installation)

Windows Server 2012 R2

Windows Server 2012 (Server Core installation)

Windows Server 2012

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 R2 for x64-based Systems Service Pack 1

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for 32-bit Systems Service Pack 2

 

四、漏洞防护


    • 补丁更新

目前微软官方已针对受支持的产品版本发布了修复以上漏洞的安全补丁,强烈建议受影响用户尽快安装补丁进行防护,官方下载链接:

https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr

注:由于网络问题、计算机环境问题等原因,Windows Update的补丁更新可能出现失败。用户在安装补丁后,应及时检查补丁是否成功更新。

右键点击Windows图标,选择“设置(N)”,选择“更新和安全”-“Windows更新”,查看该页面上的提示信息,也可点击“查看更新历史记录”查看历史更新情况。

针对未成功安装的更新,可点击更新名称跳转到微软官方下载页面,建议用户点击该页面上的链接,转到“Microsoft更新目录”网站下载独立程序包并安装。

文章来源:https://blog.nsfocus.net/windows-4/