Microsoft questi giorni di agosto ha lavorato sodo dopo aver scoperto 111 vulnerabilità che mettevano in pericolo i suoi utenti. Per Ferragosto le ha risolte tutte. Una mega correzione che ha portato alla realizzazione di una patch di aggiornamento molto importante questo mese.
Probabilmente nemmeno sapevi di questi problemi che potrebbero mettere in seria difficoltà i tuoi dati sensibili e le tue informazioni personali. Quindi, anche se non sei un esperto di informatica, dovrai aggiornare immediatamente Windows installato sul tuo dispositivo.
Per farlo vai alle Impostazioni del tuo device cliccando sul pulsante Start in basso a sinistra dello schermo. Una volta nella pagina vai a Windows Update e cliccaci sopra. In questa sezione clicca sulla scritta Controlla aggiornamenti. In questo modo Windows cercherà gli ultimi aggiornamenti disponibili e quindi la correzione delle vulnerabilità realizzata da Microsoft.
Microsoft: tutte le 111 vulnerabilità di Windows corrette
Di seguito trovi tutte le 111 vulnerabilità di Windows che Microsoft ha corretto per il Ferragosto.
- SQL Server — CVE-2025-24999
- Microsoft Exchange Server — CVE-2025-25005
- Microsoft Exchange Server — CVE-2025-25006
- Microsoft Exchange Server — CVE-2025-25007
- Microsoft Exchange Server — CVE-2025-33051
- SQL Server — CVE-2025-47954
- Role: Windows Hyper-V — CVE-2025-48807
- Azure Virtual Machines — CVE-2025-49707
- Microsoft Office SharePoint — CVE-2025-49712
- Microsoft Edge for Android — CVE-2025-49736
- Microsoft Graphics Component — CVE-2025-49743
- Microsoft Dynamics 365 (on-premises) — CVE-2025-49745
- Role: Windows Hyper-V — CVE-2025-49751
- Microsoft Edge for Android — CVE-2025-49755
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-49757
- SQL Server — CVE-2025-49758
- SQL Server — CVE-2025-49759
- Windows Kernel — CVE-2025-49761
- Windows Ancillary Function Driver for WinSock — CVE-2025-49762
- Desktop Windows Manager — CVE-2025-50153
- Windows File Explorer — CVE-2025-50154
- Windows Push Notifications — CVE-2025-50155
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-50156
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-50157
- Windows NTFS — CVE-2025-50158
- Remote Access Point-to-Point Protocol (PPP) EAP-TLS — CVE-2025-50159
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-50160
- Windows Win32K – GRFX — CVE-2025-50161
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-50162
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-50163
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-50164
- Microsoft Graphics Component — CVE-2025-50165
- Windows Distributed Transaction Coordinator — CVE-2025-50166
- Role: Windows Hyper-V — CVE-2025-50167
- Windows Win32K – ICOMP — CVE-2025-50168
- Windows SMB — CVE-2025-50169
- Windows Cloud Files Mini Filter Driver — CVE-2025-50170
- Remote Desktop Server — CVE-2025-50171
- Windows DirectX — CVE-2025-50172
- Windows Installer — CVE-2025-50173
- Graphics Kernel — CVE-2025-50176
- Windows Message Queuing — CVE-2025-50177
- Windows Media — CVE-2025-53131
- Windows Win32K – GRFX — CVE-2025-53132
- Windows PrintWorkflowUserSvc — CVE-2025-53133
- Windows Ancillary Function Driver for WinSock — CVE-2025-53134
- Windows DirectX — CVE-2025-53135
- Windows NT OS Kernel — CVE-2025-53136
- Windows Ancillary Function Driver for WinSock — CVE-2025-53137
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-53138
- Kernel Transaction Manager — CVE-2025-53140
- Windows Ancillary Function Driver for WinSock — CVE-2025-53141
- Microsoft Brokering File System — CVE-2025-53142
- Windows Message Queuing — CVE-2025-53143
- Windows Message Queuing — CVE-2025-53144
- Windows Message Queuing — CVE-2025-53145
- Windows Ancillary Function Driver for WinSock — CVE-2025-53147
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-53148
- Kernel Streaming WOW Thunk Service Driver — CVE-2025-53149
- Windows Kernel — CVE-2025-53151
- Desktop Windows Manager — CVE-2025-53152
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-53153
- Windows Ancillary Function Driver for WinSock — CVE-2025-53154
- Role: Windows Hyper-V — CVE-2025-53155
- Storage Port Driver — CVE-2025-53156
- Windows Local Security Authority Subsystem Service (LSASS) — CVE-2025-53716
- Windows Ancillary Function Driver for WinSock — CVE-2025-53718
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-53719
- Windows Routing and Remote Access Service (RRAS) — CVE-2025-53720
- Windows Connected Devices Platform Service — CVE-2025-53721
- Windows Remote Desktop Services — CVE-2025-53722
- Role: Windows Hyper-V — CVE-2025-53723
- Windows Push Notifications — CVE-2025-53724
- Windows Push Notifications — CVE-2025-53725
- Windows Push Notifications — CVE-2025-53726
- SQL Server — CVE-2025-53727
- Microsoft Dynamics 365 (on-premises) — CVE-2025-53728
- Azure File Sync — CVE-2025-53729
- Microsoft Office Visio — CVE-2025-53730
- Microsoft Office — CVE-2025-53731
- Microsoft Office — CVE-2025-53732
- Microsoft Office Word — CVE-2025-53733
- Microsoft Office Visio — CVE-2025-53734
- Microsoft Office Excel — CVE-2025-53735
- Microsoft Office Word — CVE-2025-53736
- Microsoft Office Excel — CVE-2025-53737
- Microsoft Office Word — CVE-2025-53738
- Microsoft Office Excel — CVE-2025-53739
- Microsoft Office — CVE-2025-53740
- Microsoft Office Excel — CVE-2025-53741
- Microsoft Office Excel — CVE-2025-53759
- Microsoft Office SharePoint — CVE-2025-53760
- Microsoft Office PowerPoint — CVE-2025-53761
- Azure Stack — CVE-2025-53765
- Windows GDI+ — CVE-2025-53766
- Azure OpenAI — CVE-2025-53767
- Windows Security App — CVE-2025-53769
- Web Deploy — CVE-2025-53772
- GitHub Copilot and Visual Studio — CVE-2025-53773
- Microsoft 365 Copilot’s Business Chat — CVE-2025-53774
- Windows NTLM — CVE-2025-53778
- Windows Kerberos — CVE-2025-53779
- Azure Virtual Machines — CVE-2025-53781
- Microsoft Teams — CVE-2025-53783
- Microsoft Office Word — CVE-2025-53784
- Microsoft Exchange Server — CVE-2025-53786
- Microsoft 365 Copilot’s Business Chat — CVE-2025-53787
- Windows Subsystem for Linux — CVE-2025-53788
- Windows StateRepository API — CVE-2025-53789
- Azure Portal — CVE-2025-53792
- Azure Stack — CVE-2025-53793