CISA: High-severity Windows SMB flaw now exploited in attacks
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读全文,抓住关键点。 文章主要讲的是CISA指出一个高危的Windows SMB漏洞CVE-2025-33073正在被积极利用。这个漏洞影响所有Windows Server、Windows 10和部分Windows 11系统。微软已经在6月的补丁星期二修复了它,但CISA称该漏洞已被用于攻击。 接下来,我需要将这些信息浓缩到100字以内。要确保包含漏洞名称、影响范围、微软修复时间以及CISA的警告。同时,避免使用“文章内容总结”这样的开头,直接描述即可。 可能的结构是:CISA警告高危漏洞CVE-2025-33073影响多个Windows版本,已修复但被积极利用,建议尽快打补丁。 检查字数是否符合要求,并确保信息准确无误。 </think> CISA警告称,高危Windows SMB漏洞CVE-2025-33073已被积极利用,影响所有Windows Server、Windows 10及部分Windows 11系统。微软已修复该漏洞,但建议用户尽快更新以防范攻击。 2025-10-20 17:19:38 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

Windows

CISA says threat actors are now actively exploiting a high-severity Windows SMB privilege escalation vulnerability that can let them gain SYSTEM privileges on unpatched systems.

Tracked as CVE-2025-33073, this security flaw impacts all Windows Server and Windows 10 versions, as well as Windows 11 systems up to Windows 11 24H2.

Microsoft patched the vulnerability during the June 2025 Patch Tuesday, when it also revealed that it stems from an improper access control weakness that enables authorized attackers to elevate privileges over a network.

"The attacker could convince a victim to connect to an attacker controlled malicious application (for example, SMB) server. Upon connecting, the malicious server could compromise the protocol," the company explained.

"To exploit this vulnerability, an attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate. This could result in elevation of privilege."

At the time, a security advisory indicated that information about the bug was already publicly accessible before the security updates were released, however the company has yet to publicly acknowledge CISA's claims that CVE-2025-33073 is under active exploitation. 

Microsoft has attributed the discovery of this flaw to multiple security researchers, including CrowdStrike's Keisuke Hirata, Synacktiv's Wilfried Bécard, SySS GmbH's Stefan Walter, Google Project Zero's James Forshaw, and RedTeam Pentesting GmbH.

CISA has yet to share more information regarding ongoing CVE-2025-33073 attacks, but it has added the flaw to its Known Exploited Vulnerabilities Catalog, giving Federal Civilian Executive Branch (FCEB) agencies three weeks to secure their systems by November 10, as mandated by Binding Operational Directive (BOD) 22-01.

While BOD 22-01 only targets federal agencies, the U.S. cybersecurity agency encourages all organizations, including those in the private sector, to ensure that this actively exploited security bug is patched as soon as possible.

"These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise," CISA cautioned on Monday.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-high-severity-windows-smb-flaw-now-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh