A newly reported Windows NTFS vulnerability described as a stack-based buffer overflow that “allows an authorized attacker to execute code locally” has raised immediate concern—but the specific CVE identifier you provided (CVE-2025-54916) could not be located in public vendor and vulnerability...
Microsoft’s advisory link for CVE-2025-54908 points to a PowerPoint use‑after‑free that “allows an unauthorized attacker to execute code locally,” but that specific CVE number could not be corroborated in public vulnerability trackers at the time of verification; when attempting to load the...
Microsoft’s Security Response Center has published an advisory for CVE-2025-54907, describing a heap-based buffer overflow in Microsoft Office Visio that can allow an unauthorized attacker to execute code in the context of the user who opens a malicious file. This is a document‑parser...
Microsoft's advisory confirms a use‑after‑free flaw in Microsoft Excel that can lead to local code execution when a specially crafted spreadsheet is opened, creating a potentially serious escalation path on unpatched systems.
Overview
This vulnerability, tracked as CVE‑2025‑54904, is listed in...
Microsoft has published an advisory for CVE-2025-54906, a Microsoft Office vulnerability described as a “free of memory not on the heap” condition that can lead to local remote‑code‑execution (RCE) when a user opens or previews a specially crafted Office document; Microsoft lists the...
A newly disclosed Microsoft Excel vulnerability tracked as CVE-2025-54902 is an out‑of‑bounds read flaw in Excel’s file‑parsing logic that Microsoft warns could allow an attacker to achieve code execution on a targeted machine when a user opens a specially crafted spreadsheet, and organizations...
Microsoft’s security tracker lists CVE-2025-54898 as an out-of-bounds read vulnerability in Microsoft Excel that can be triggered by a crafted spreadsheet and may allow an attacker to achieve local code execution when a user opens a malicious file.
Background
Microsoft Excel remains one of the...
Microsoft has published an advisory for CVE-2025-54896: a use-after-free vulnerability in Microsoft Office Excel that, when exploited via a specially crafted workbook, can lead to code execution in the context of the user who opens the file. This class of bug is a recurring and high-consequence...
Microsoft’s advisory for CVE-2025-54895 warns that an integer overflow or wraparound in the SPNEGO Extended Negotiation (NEGOEX) security mechanism can be triggered by an authorized local actor to elevate privileges, turning a legitimate local account into a pathway to SYSTEM-level control if...
A newly disclosed vulnerability affecting Windows' Routing and Remote Access Service (RRAS) can allow remote attackers to execute code against unpatched RRAS hosts — administrators must treat any RRAS-enabled servers exposed to untrusted networks as high-priority for patching, isolation, and...
Microsoft’s advisory identifies CVE-2025-54101 as a use‑after‑free vulnerability in the Windows SMBv3 Client that can be triggered over a network and may allow an attacker to execute arbitrary code in the context of the affected process. This is a serious client‑side remote code execution (RCE)...
Microsoft has confirmed CVE-2025-53798 — an information-disclosure vulnerability in the Windows Routing and Remote Access Service (RRAS) — and released a vendor update; administrators who run RRAS must treat exposed RRAS endpoints as high-priority to remediate or isolate until patches are...
Microsoft has published an advisory for CVE-2025-54096, a vulnerability in the Windows Routing and Remote Access Service (RRAS) that allows an out-of-bounds read and can be abused by a remote attacker to disclose sensitive information over a network — a high-priority fix for any server running...
Microsoft’s security team has published an advisory for an information‑disclosure bug in the Windows Routing and Remote Access Service (RRAS) — tracked as CVE‑2025‑53797 — describing an out‑of‑bounds / uninitialized‑resource read that can allow an attacker to obtain memory contents across the...
Rockwell Automation’s FactoryTalk Analytics LogixAI has a serious configuration weakness that demands immediate attention from OT and IT teams: CISA republished an advisory assigning CVE-2025-9364 to an overly permissive Redis instance used by LogixAI, calling out exposure of sensitive system...
Rockwell Automation’s ThinManager has been flagged for a high-severity Server-Side Request Forgery (SSRF) flaw that can expose an industrial control system’s ThinServer service account NTLM credentials, according to a federal advisory reissued on September 9, 2025. The vulnerability—tracked...
CISA’s September 9, 2025 bulletin consolidating fourteen Industrial Control Systems advisories is a blunt reminder that the OT security landscape remains both crowded and volatile — the list spans high‑impact Rockwell Automation products, ABB building‑management gear, Schneider and Mitsubishi...
A recently republished U.S. federal advisory warns that Rockwell Automation’s FactoryTalk Activation Manager contains a cryptographic implementation flaw that can be exploited remotely to decrypt or tamper with activation and management traffic — an issue assigned CVE‑2025‑7970 and rated with a...
Rockwell Automation’s 1783‑NATR I/O adapter has been flagged by CISA as vulnerable to a third‑party component flaw that can cause memory corruption, carrying a CVSS v4 base score of 6.9 and described as remotely exploitable with low attack complexity — operators should treat it as an immediate...
A newly republished advisory from CISA and Rockwell Automation raises urgent operational and security flags for organizations using the CompactLogix® 5480 controller family: the devices running specific Windows packages are affected by a Missing Authentication for Critical Function vulnerability...