MSRC Reports
61 subscribers
2.99K links
Microsoft Security Response Center Reports
(Unofficial).

Reports usually come in bursts, because that's just how Microsoft releases them.
Download Telegram
CVE-2025-27748 Microsoft Office Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27748
CVE-2025-27746 Microsoft Office Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27746
CVE-2025-27745 Microsoft Office Remote Code Execution Vulnerability

Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the [Release Notes](https://go.microsoft.com/fwlink/p/?linkid=831049) for more information and download links.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27745
CVE-2024-21302 Windows Secure Kernel Mode Elevation of Privilege Vulnerability

To comprehensively address CVE-2024-21302, Microsoft has released April 2025 security updates for all supported editions of Windows. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21302
CVE-2025-27729 Windows Shell Remote Code Execution Vulnerability

Updated acknowledgment. This is an informational change only.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27729
Chromium: CVE-2025-3619 Heap buffer overflow in Codecs

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3619
Chromium: CVE-2025-3620 Use after free in USB

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/202 5) for more information.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-3620
CVE-2025-25000 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

Corrected Build Number in the Security Updates table. This is an informational change only.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25000
CVE-2025-24054 NTLM Hash Disclosure Spoofing Vulnerability

Added an acknowledgement. This is an informational change only.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
CVE-2025-21199 Azure Agent Installer for Backup and Site Recovery Elevation of Privilege Vulnerability

Updated acknowledgment. This is an informational change only.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21199
CVE-2025-21416 Azure Virtual Desktop Elevation of Privilege Vulnerability

Missing authorization in Azure Virtual Desktop allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21416
CVE-2025-30392 Azure AI bot Elevation of Privilege Vulnerability

Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30392
CVE-2025-30390 Azure ML Compute Elevation of Privilege Vulnerability

Improper authorization in Azure allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30390
CVE-2025-33074 Azure Functions Remote Code Execution Vulnerability

Improper verification of cryptographic signature in Microsoft Azure Functions allows an authorized attacker to execute code over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33074
CVE-2025-30389 Azure Bot Framework SDK Elevation of Privilege Vulnerability

Improper authorization in Azure Bot Framework SDK allows an unauthorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30389
CVE-2025-30391 Microsoft Dynamics Information Disclosure Vulnerability

Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30391
CVE-2025-47732 Microsoft Dataverse Remote Code Execution Vulnerability

Information published.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47732
CVE-2025-47733 Microsoft Power Apps Information Disclosure Vulnerability

Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47733
CVE-2025-29813 Azure DevOps Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when Visual Studio improperly handles pipeline job tokens. An attacker who successfully exploited this vulnerability could extend their access to a project. To exploit this vulnerability, an attacker would first have to have access to the project and swap the short-term token for a long-term one.The update addresses the vulnerability by correcting how the Visual Studio updater handles these tokens.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29813
CVE-2025-29827 Azure Automation Elevation of Privilege Vulnerability

Improper Authorization in Azure Automation allows an authorized attacker to elevate privileges over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827
CVE-2025-29972 Azure Storage Resource Provider Spoofing Vulnerability

Server-Side Request Forgery (SSRF) in Azure allows an authorized attacker to perform spoofing over a network.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29972