+92 310 8202561
ccienca@gmail.com

Microsoft Patches 130 Vulnerabilities: Critical Fixes in SPNEGO and SQL Server

In its July 2025 Patch Tuesday release, Microsoft has addressed 130 vulnerabilities, including 10 critical flaws impacting key components like SQL Server and SPNEGO (NEGOEX). While no zero-day exploits were patched this time—a first in 11 months—experts stress that the urgency to apply these patches remains extremely high.

Key Highlights

  • Total vulnerabilities patched: 130

  • Critical vulnerabilities: 10

  • Publicly disclosed vulnerabilities: 1

  • Exploited vulnerabilities in the wild: 0 (this month)

  • Top CVEs:

    • CVE-2025-47981 – SPNEGO RCE flaw (CVSS 9.8)

    • CVE-2025-49719 – SQL Server Info Disclosure (CVSS 7.5)

SPNEGO Critical RCE Vulnerability (CVE-2025-47981)

The most serious flaw addressed this month is a heap-based buffer overflow in Windows SPNEGO Extended Negotiation, which allows unauthenticated remote attackers to execute code over a network.

  • Severity: Critical (CVSS 9.8)

  • Impact: Remote Code Execution (RCE)

  • Affected systems: Windows 10 version 1607 and newer

  • Pre-requisites: No authentication required – only network access

  • Researchers: Anonymous & Yuki Chen

Warning: Experts say this flaw may be “wormable”, making it potentially as devastating as WannaCry. Admins are advised to patch immediately.

SQL Server Info Disclosure (CVE-2025-49719)

A serious information disclosure bug in Microsoft SQL Server was also patched. Although it’s not being actively exploited, it was publicly disclosed before this update, increasing the risk of future attacks.

  • Issue: Leak of uninitialized memory

  • Potential impact: Exposure of credentials, cryptographic material

  • Cause: Improper input validation in memory management

  • CVSS Score: 7.5

  • Affected services: SQL Server engine and OLE DB applications

Experts believe attackers could extract sensitive remnants like connection strings or cryptographic keys using this vulnerability.

Other Notable Vulnerabilities

  • CVE-2025-49735 – Windows KDC Proxy RCE

    • CVSS Score: 8.1

    • Impact: Pre-authentication remote compromise

    • Concern: Nation-state and APT actors

  • CVE-2025-48822 – Windows Hyper-V RCE

    • CVSS Score: 8.6

  • CVE-2025-49695–97 – Microsoft Office RCE flaws

    • CVSS Scores: Up to 8.4

BitLocker Bypass Vulnerabilities

Five vulnerabilities were found in BitLocker, Microsoft’s built-in disk encryption feature. These allow physical attackers to potentially access encrypted data under specific conditions using crafted WinRE.wim files.

  • CVEs: CVE-2025-48001, 48003, 48800, 48804, 48818

  • Risk: Physical access attacks during OS unlock

  • Researchers: Microsoft Offensive Research (MORSE)

End of Support: SQL Server 2012

As of July 8, 2025, Microsoft has officially ended support for SQL Server 2012. No future security updates will be provided, and organizations still using it are urged to upgrade immediately.

Patches from Other Vendors

Microsoft wasn’t the only one busy this month. Vendors including Adobe, AMD, Cisco, Dell, Fortinet, GitLab, Google Chrome, HP, Jenkins, NVIDIA, SAP, WordPress, and over 50 others also released critical security patches.

Admins are advised to review updates from:

  • Linux Distributions (Red Hat, Ubuntu, Debian, etc.)

  • Networking Hardware (Juniper, Aruba, Ruckus)

  • Cloud Providers (Google Cloud, VMware)

  • Productivity Suites (Zoom, Zimbra, Atlassian)

What You Should Do

  1. Apply Microsoft’s July 2025 updates immediately, especially CVE-2025-47981.

  2. Scan your environment for unpatched SQL Server deployments.

  3. Retire SQL Server 2012 if still in use.

  4. Check for firmware and software updates from other vendors.

  5. Enable vulnerability scanning and patch automation to avoid missing future critical fixes.

Stay Updated

For more cybersecurity news, insights, and patch alerts, follow [CCIE Academy] on [Twitter] and [LinkedIn].

📍 Location: Makkah Mall, 2nd Floor, Nawa Killi, Quetta, Pakistan
📞 Contact: +923108202561
🌐 Website: https://ccieacademy.org