Microsoft addresses severe vulnerability affecting multiple products, urging immediate action from all organizations.
Microsoft has released critical security updates addressing CVE-2025-64669, a vulnerability affecting multiple products including Windows Server, Azure, and Microsoft 365. The vulnerability carries a CVSS score of 9.8, indicating critical severity and immediate risk to unpatched systems.
The vulnerability allows remote code execution with no user interaction required. Attackers could exploit this vulnerability to take control of affected systems, install malware, or steal sensitive data. No authentication is required for exploitation.
Affected products include:
- Windows 10 (Version 21H2 and later)
- Windows 11 (All versions)
- Windows Server 2022
- Azure Stack HCI
- Microsoft 365 Apps for Enterprise
Microsoft has released security updates as part of the January 2025 Security Update. Organizations must apply these patches immediately. The updates are available through Windows Update, Microsoft Update, and the Microsoft Update Catalog.
For systems that cannot be patched immediately, Microsoft recommends implementing the following mitigations:
- Enable Windows Defender Exploit Guard
- Configure network firewalls to block unnecessary ports
- Implement application whitelisting
- Restrict administrative privileges
Organizations should also monitor their networks for suspicious activity. The vulnerability leaves clear forensic indicators that security teams can detect.
Microsoft has confirmed they are aware of limited targeted exploitation of this vulnerability in the wild. Organizations running affected systems should prioritize patching these systems above all other security tasks.
For detailed technical information about the vulnerability and the specific patches required, organizations should review the Microsoft Security Advisory and the Security Update Guide.
The vulnerability was discovered by Microsoft's internal security team and reported through their MSRC program. Microsoft is offering a $500,000 bounty for any additional information about this vulnerability or similar vulnerabilities in their products.
Comments
Please log in or register to join the discussion