PT-2025-32788 · Microsoft · Graphics +1
4N0Nym4U5
·
Published
2025-08-12
·
Updated
2025-08-31
·
CVE-2025-50165
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Microsoft Windows versions (affected versions not specified)
Microsoft Office versions (affected versions not specified)
Description:
An untrusted pointer dereference exists in the Microsoft Graphics Component, potentially allowing an unauthorized attacker to execute code over a network. This can occur without user interaction, potentially triggered by opening a document (such as Word, Excel, or PowerPoint) containing an embedded JPEG image or even a JPEG image embedded in an email. The vulnerability involves an uninitialized function pointer being called during JPEG image decoding. Several use-after-free bugs were also identified in Microsoft Office and Word, potentially leading to code execution when opening a malicious document. Additionally, vulnerabilities were found in Microsoft Message Queuing (MSMQ) and Microsoft Exchange Server. Two of the vulnerabilities are reportedly being exploited in the wild.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Untrusted Pointer Dereference
Use of Uninitialized Resource
Related Identifiers
Affected Products
References · 17
- https://nvd.nist.gov/vuln/detail/CVE-2025-50165 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50165 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-10072 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50165 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50165 · Security Note
- https://t.me/purp_sec/1027 · Telegram Post
- https://twitter.com/windowsforum/status/1955328234242920589 · Twitter Post
- https://twitter.com/CVEnew/status/1955322682318246329 · Twitter Post
- https://twitter.com/PixelKnightSec/status/1957363887747010746 · Twitter Post
- https://t.me/avleonovcom/1572 · Telegram Post
- https://twitter.com/RedaAnoar/status/1955808543455539222 · Twitter Post
- https://roboshadow.com/blog/patch-tuesday-august-2025?rid=socialpost · Reddit Post
- https://twitter.com/sequretek_sqtk/status/1955964510235189333 · Twitter Post
- https://twitter.com/RedaAnoar/status/1955808266455241070 · Twitter Post
- https://twitter.com/ivan_windon/status/1960373283854967013 · Twitter Post