Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53729 (GCVE-0-2025-53729)
Vulnerability from cvelistv5 – Published: 2025-08-12 17:09 – Updated: 2026-02-26 17:49- CWE-284 - Improper Access Control
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Azure File Sync |
Affected:
1.0.0 , < 18.3.0.0
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53729",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-13T15:02:39.508025Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:49:24.147Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Azure File Sync",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "18.3.0.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3.0.0",
"versionStartIncluding": "1.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2025-08-12T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284: Improper Access Control",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-13T18:53:59.594Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Microsoft Azure File Sync Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory",
"patch"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729"
}
],
"title": "Microsoft Azure File Sync Elevation of Privilege Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2025-53729",
"datePublished": "2025-08-12T17:09:44.551Z",
"dateReserved": "2025-07-09T03:10:34.738Z",
"dateUpdated": "2026-02-26T17:49:24.147Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53729\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2025-08-12T18:15:42.553\",\"lastModified\":\"2025-08-14T17:07:25.733\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.\"},{\"lang\":\"es\",\"value\":\"El control de acceso inadecuado en Azure File Sync permite que un atacante autorizado eleve privilegios localmente.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-284\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"18.0.0.0\",\"versionEndExcluding\":\"18.3.0.0\",\"matchCriteriaId\":\"1172DD83-F133-4FD8-9860-C4864A3D24D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"19.0.0.0\",\"versionEndExcluding\":\"19.2.0.0\",\"matchCriteriaId\":\"F9620626-C392-43AF-90DE-CC57E38A5741\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"20.0.0.0\",\"versionEndExcluding\":\"20.1.0.0\",\"matchCriteriaId\":\"453B8B15-9A96-4237-BB9E-2D5E9B9E7E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"21.0.0.0\",\"versionEndIncluding\":\"21.1.0.0\",\"matchCriteriaId\":\"1D79249F-9002-4576-8983-FC0753EBBB2A\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53729\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-13T15:02:39.508025Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-12T19:08:26.130Z\"}}], \"cna\": {\"title\": \"Microsoft Azure File Sync Elevation of Privilege Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Azure File Sync\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"lessThan\": \"18.3.0.0\", \"versionType\": \"custom\"}]}], \"datePublic\": \"2025-08-12T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729\", \"name\": \"Microsoft Azure File Sync Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\", \"patch\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"CWE-284: Improper Access Control\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"18.3.0.0\", \"versionStartIncluding\": \"1.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2026-02-13T18:53:59.594Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53729\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-26T17:49:24.147Z\", \"dateReserved\": \"2025-07-09T03:10:34.738Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2025-08-12T17:09:44.551Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0688
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure File Sync v19 versions antérieures à 19.2.0.0 | ||
| Microsoft | Azure | Azure Stack Hub versions antérieures à 102.10.2.11 | ||
| Microsoft | Azure | Azure Stack Hub 2501 versions antérieures à 1.2501.1.47 | ||
| Microsoft | Azure | Azure File Sync v20 versions antérieures à 20.1.0.0 | ||
| Microsoft | Azure | Azure File Sync v18 versions antérieures à 18.3.0.0 | ||
| Microsoft | Azure | Azure Stack Hub 2406 versions antérieures à 1.2406.1.23 | ||
| Microsoft | Azure | Azure Stack Hub 2408 versions antérieures à 1.2408.1.50 | ||
| Microsoft | Azure | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 Azure Connect Feature Pack versions antérieures à 13.0.7060.1 | ||
| Microsoft | Azure | Azure File Sync v21 versions antérieures à 21.1.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure File Sync v19 versions ant\u00e9rieures \u00e0 19.2.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub versions ant\u00e9rieures \u00e0 102.10.2.11",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2501 versions ant\u00e9rieures \u00e0 1.2501.1.47",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v20 versions ant\u00e9rieures \u00e0 20.1.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v18 versions ant\u00e9rieures \u00e0 18.3.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2406 versions ant\u00e9rieures \u00e0 1.2406.1.23",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2408 versions ant\u00e9rieures \u00e0 1.2408.1.50",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 Azure Connect Feature Pack versions ant\u00e9rieures \u00e0 13.0.7060.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v21 versions ant\u00e9rieures \u00e0 21.1.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53793"
},
{
"name": "CVE-2025-53727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53727"
},
{
"name": "CVE-2025-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24999"
},
{
"name": "CVE-2025-53729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53729"
},
{
"name": "CVE-2025-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49759"
},
{
"name": "CVE-2025-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53781"
},
{
"name": "CVE-2025-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49707"
},
{
"name": "CVE-2025-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53765"
},
{
"name": "CVE-2025-49758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49758"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0688",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53793",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53793"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53781",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53781"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53727"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53765",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49758",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49758"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49759",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49759"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49707",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49707"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-24999",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24999"
}
]
}
CERTFR-2025-AVI-0688
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure File Sync v19 versions antérieures à 19.2.0.0 | ||
| Microsoft | Azure | Azure Stack Hub versions antérieures à 102.10.2.11 | ||
| Microsoft | Azure | Azure Stack Hub 2501 versions antérieures à 1.2501.1.47 | ||
| Microsoft | Azure | Azure File Sync v20 versions antérieures à 20.1.0.0 | ||
| Microsoft | Azure | Azure File Sync v18 versions antérieures à 18.3.0.0 | ||
| Microsoft | Azure | Azure Stack Hub 2406 versions antérieures à 1.2406.1.23 | ||
| Microsoft | Azure | Azure Stack Hub 2408 versions antérieures à 1.2408.1.50 | ||
| Microsoft | Azure | Microsoft SQL Server 2016 pour systèmes x64 Service Pack 3 Azure Connect Feature Pack versions antérieures à 13.0.7060.1 | ||
| Microsoft | Azure | Azure File Sync v21 versions antérieures à 21.1.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure File Sync v19 versions ant\u00e9rieures \u00e0 19.2.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub versions ant\u00e9rieures \u00e0 102.10.2.11",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2501 versions ant\u00e9rieures \u00e0 1.2501.1.47",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v20 versions ant\u00e9rieures \u00e0 20.1.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v18 versions ant\u00e9rieures \u00e0 18.3.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2406 versions ant\u00e9rieures \u00e0 1.2406.1.23",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack Hub 2408 versions ant\u00e9rieures \u00e0 1.2408.1.50",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SQL Server 2016 pour syst\u00e8mes x64 Service Pack 3 Azure Connect Feature Pack versions ant\u00e9rieures \u00e0 13.0.7060.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure File Sync v21 versions ant\u00e9rieures \u00e0 21.1.0.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53793"
},
{
"name": "CVE-2025-53727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53727"
},
{
"name": "CVE-2025-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24999"
},
{
"name": "CVE-2025-53729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53729"
},
{
"name": "CVE-2025-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49759"
},
{
"name": "CVE-2025-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53781"
},
{
"name": "CVE-2025-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49707"
},
{
"name": "CVE-2025-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53765"
},
{
"name": "CVE-2025-49758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49758"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0688",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53729",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53793",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53793"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53781",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53781"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53727",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53727"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-53765",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49758",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49758"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49759",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49759"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-49707",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49707"
},
{
"published_at": "2025-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2025-24999",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24999"
}
]
}
MSRC_CVE-2025-53729
Vulnerability from csaf_microsoft - Published: 2025-08-12 07:00 - Updated: 2025-08-12 07:00Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Michal Kamensky with Microsoft"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53729 Microsoft Azure File Sync Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729"
},
{
"category": "self",
"summary": "CVE-2025-53729 Microsoft Azure File Sync Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53729.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Microsoft Azure File Sync Elevation of Privilege Vulnerability",
"tracking": {
"current_release_date": "2025-08-12T07:00:00.000Z",
"generator": {
"date": "2025-09-17T17:51:59.075Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-53729",
"initial_release_date": "2025-08-12T07:00:00.000Z",
"revision_history": [
{
"date": "2025-08-12T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.3.0.0",
"product": {
"name": "Azure File Sync v18 \u003c18.3.0.0",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "18.3.0.0",
"product": {
"name": "Azure File Sync v18 18.3.0.0",
"product_id": "12340"
}
}
],
"category": "product_name",
"name": "Azure File Sync v18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c19.2.0.0",
"product": {
"name": "Azure File Sync v19 \u003c19.2.0.0",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "19.2.0.0",
"product": {
"name": "Azure File Sync v19 19.2.0.0",
"product_id": "16746"
}
}
],
"category": "product_name",
"name": "Azure File Sync v19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1.0.0",
"product": {
"name": "Azure File Sync v20 \u003c20.1.0.0",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "20.1.0.0",
"product": {
"name": "Azure File Sync v20 20.1.0.0",
"product_id": "16747"
}
}
],
"category": "product_name",
"name": "Azure File Sync v20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c21.1.0.0",
"product": {
"name": "Azure File Sync v21 \u003c21.1.0.0",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "21.1.0.0",
"product": {
"name": "Azure File Sync v21 21.1.0.0",
"product_id": "16809"
}
}
],
"category": "product_name",
"name": "Azure File Sync v21"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53729",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.",
"title": "What privileges could be gained by an attacker who successfully exploited this vulnerability?"
}
],
"product_status": {
"fixed": [
"12340",
"16746",
"16747",
"16809"
],
"known_affected": [
"1",
"2",
"3",
"4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53729 Microsoft Azure File Sync Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729"
},
{
"category": "self",
"summary": "CVE-2025-53729 Microsoft Azure File Sync Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2025/msrc_cve-2025-53729.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-12T07:00:00.000Z",
"details": "18.3.0.0:Security Update:https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-release-notes",
"product_ids": [
"4"
],
"url": "https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-release-notes"
},
{
"category": "vendor_fix",
"date": "2025-08-12T07:00:00.000Z",
"details": "19.2.0.0:Security Update:https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-release-notes",
"product_ids": [
"3"
],
"url": "https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-release-notes"
},
{
"category": "vendor_fix",
"date": "2025-08-12T07:00:00.000Z",
"details": "20.1.0.0:Security Update:https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-release-notes",
"product_ids": [
"2"
],
"url": "https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-release-notes"
},
{
"category": "vendor_fix",
"date": "2025-08-12T07:00:00.000Z",
"details": "21.1.0.0:Security Update:https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-release-notes",
"product_ids": [
"1"
],
"url": "https://learn.microsoft.com/en-us/azure/storage/file-sync/file-sync-release-notes"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 6.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Elevation of Privilege"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "Microsoft Azure File Sync Elevation of Privilege Vulnerability"
}
]
}
NCSC-2025-0249
Vulnerability from csaf_ncscnl - Published: 2025-08-13 07:22 - Updated: 2025-08-13 07:22Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Azure-producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden zijn gerelateerd aan onjuiste toegangscontrolemechanismen, waardoor geautoriseerde aanvallers lokale spoofing-aanvallen kunnen uitvoeren, verhoogde privileges kunnen verkrijgen, gevoelige informatie kunnen onthullen en de integriteit van systemen kunnen compromitteren. Dit kan leiden tot ongeautoriseerde toegang en manipulatie van gevoelige gegevens.\n```\nAzure Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53765 | 4.40 | Toegang tot gevoelige gegevens | \n| CVE-2025-53793 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nAzure OpenAI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53767 | 10.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Portal: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53792 | 9.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Virtual Machines: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53781 | 7.70 | Toegang tot gevoelige gegevens | \n| CVE-2025-49707 | 7.90 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nAzure File Sync: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2025-53729 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://portal.msrc.microsoft.com/en-us/security-guidance"
}
],
"title": "Kwetsbaarheden verholpen in Azure-producten",
"tracking": {
"current_release_date": "2025-08-13T07:22:17.432067Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.2"
}
},
"id": "NCSC-2025-0249",
"initial_release_date": "2025-08-13T07:22:17.432067Z",
"revision_history": [
{
"date": "2025-08-13T07:22:17.432067Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/open ai",
"product": {
"name": "vers:unknown/open ai",
"product_id": "CSAFPID-3039718",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:open_ai"
}
}
},
{
"category": "product_version_range",
"name": "vers:unknown/portal",
"product": {
"name": "vers:unknown/portal",
"product_id": "CSAFPID-3039717",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:portal"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049136"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3049230"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c18.3.0.0",
"product_id": "CSAFPID-3049229"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product": {
"name": "vers:unknown/\u003e=18.0|\u003c18.0.0.0",
"product_id": "CSAFPID-3048954"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product": {
"name": "vers:unknown/\u003e=19.0|\u003c19.1.0.0",
"product_id": "CSAFPID-3048951"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product": {
"name": "vers:unknown/\u003e=20.0|\u003c20.0.0.0",
"product_id": "CSAFPID-3048952"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product": {
"name": "vers:unknown/\u003e=21.0|\u003c21.2.0.0",
"product_id": "CSAFPID-3048953"
}
}
],
"category": "product_name",
"name": "Azure File Sync"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/1.2406.1.23",
"product": {
"name": "vers:microsoft/1.2406.1.23",
"product_id": "CSAFPID-3049184"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2408.1.50",
"product": {
"name": "vers:microsoft/1.2408.1.50",
"product_id": "CSAFPID-3049183"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/1.2501.1.47",
"product": {
"name": "vers:microsoft/1.2501.1.47",
"product_id": "CSAFPID-3049182"
}
},
{
"category": "product_version_range",
"name": "vers:microsoft/102.10.2.11",
"product": {
"name": "vers:microsoft/102.10.2.11",
"product_id": "CSAFPID-3049090"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/\u003e=1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3049089"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "product_family",
"name": "Microsoft"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v18"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v19"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v20"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3049762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure File Sync v21"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_open-AI:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3038234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_portal:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-1560226",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:microsoft/unknown",
"product": {
"name": "vers:microsoft/unknown",
"product_id": "CSAFPID-3048852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hub_2406:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Azure Stack Hub 2406"
}
],
"category": "product_family",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038148"
}
}
],
"category": "product_name",
"name": "Azure Open AI"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/n/a",
"product": {
"name": "vers:unknown/n/a",
"product_id": "CSAFPID-3038150"
}
}
],
"category": "product_name",
"name": "Azure Portal"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product": {
"name": "vers:unknown/1.0.0|\u003c102.10.2.11",
"product_id": "CSAFPID-3048737"
}
}
],
"category": "product_name",
"name": "Azure Stack Hub"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49707",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49707 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49707.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-49707"
},
{
"cve": "CVE-2025-53729",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53729 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53729.json"
}
],
"title": "CVE-2025-53729"
},
{
"cve": "CVE-2025-53765",
"cwe": {
"id": "CWE-359",
"name": "Exposure of Private Personal Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Private Personal Information to an Unauthorized Actor",
"title": "CWE-359"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53765 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53765.json"
}
],
"title": "CVE-2025-53765"
},
{
"cve": "CVE-2025-53767",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53767 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53767"
},
{
"cve": "CVE-2025-53781",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53781 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53781.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53781"
},
{
"cve": "CVE-2025-53792",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53792 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53792.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
}
],
"title": "CVE-2025-53792"
},
{
"cve": "CVE-2025-53793",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-3039718",
"CSAFPID-3039717",
"CSAFPID-3049136",
"CSAFPID-3049230",
"CSAFPID-3049229",
"CSAFPID-3048954",
"CSAFPID-3048951",
"CSAFPID-3048952",
"CSAFPID-3048953",
"CSAFPID-3049759",
"CSAFPID-3049760",
"CSAFPID-3049761",
"CSAFPID-3049762",
"CSAFPID-3038235",
"CSAFPID-3038148",
"CSAFPID-3038234",
"CSAFPID-3038150",
"CSAFPID-3049184",
"CSAFPID-3049183",
"CSAFPID-3049182",
"CSAFPID-3049090",
"CSAFPID-1560226",
"CSAFPID-3048737",
"CSAFPID-3049089",
"CSAFPID-3048852"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53793 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53793.json"
}
],
"title": "CVE-2025-53793"
}
]
}
GHSA-H6CW-PCV6-JQ7G
Vulnerability from github – Published: 2025-08-12 18:31 – Updated: 2025-08-12 18:31Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.
{
"affected": [],
"aliases": [
"CVE-2025-53729"
],
"database_specific": {
"cwe_ids": [
"CWE-284"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-08-12T18:15:42Z",
"severity": "HIGH"
},
"details": "Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.",
"id": "GHSA-h6cw-pcv6-jq7g",
"modified": "2025-08-12T18:31:32Z",
"published": "2025-08-12T18:31:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53729"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-53729
Vulnerability from fkie_nvd - Published: 2025-08-12 18:15 - Updated: 2025-08-14 17:07| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | azure_file_sync | * | |
| microsoft | azure_file_sync | * | |
| microsoft | azure_file_sync | * | |
| microsoft | azure_file_sync | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1172DD83-F133-4FD8-9860-C4864A3D24D8",
"versionEndExcluding": "18.3.0.0",
"versionStartIncluding": "18.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9620626-C392-43AF-90DE-CC57E38A5741",
"versionEndExcluding": "19.2.0.0",
"versionStartIncluding": "19.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
"matchCriteriaId": "453B8B15-9A96-4237-BB9E-2D5E9B9E7E49",
"versionEndExcluding": "20.1.0.0",
"versionStartIncluding": "20.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D79249F-9002-4576-8983-FC0753EBBB2A",
"versionEndIncluding": "21.1.0.0",
"versionStartIncluding": "21.0.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en Azure File Sync permite que un atacante autorizado eleve privilegios localmente."
}
],
"id": "CVE-2025-53729",
"lastModified": "2025-08-14T17:07:25.733",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2025-08-12T18:15:42.553",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
CVE-2025-53729
Vulnerability from fstec - Published: 12.08.2025{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "18.0 (Microsoft Azure File Sync), 19.0 (Microsoft Azure File Sync), 20.0 (Microsoft Azure File Sync), 21.0 (Microsoft Azure File Sync)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "22.08.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "22.08.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-10150",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-53729",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Microsoft Azure File Sync",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Microsoft Azure File Sync, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (CWE-284)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Microsoft Azure File Sync \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-284",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.