安全研究

安全漏洞
Microsoft Windows SMB Client远程代码执行漏洞(CVE-2025-54101)

发布日期:2025-09-10
更新日期:2025-09-10

受影响系统:
Microsoft Windows Server 2025 (Server Core installation
Microsoft Windows Server 2025
Microsoft Windows Server 2022, 23H2 Edition (Server Cor
Microsoft Windows Server 2022 (Server Core installation
Microsoft Windows Server 2022
Microsoft Windows Server 2019 (Server Core Installation
Microsoft Windows Server 2019
Microsoft Windows Server 2016 (Server Core Installation
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2 (Server Core installat
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012 (Server Core installation
Microsoft Windows Server 2012
Microsoft Windows 10 for x64-based Systems
Microsoft Windows 10 for 32-bit Systems
Microsoft Windows 10 22H2 for x64-based Systems
Microsoft Windows 10 22H2 for ARM64-based Systems
Microsoft Windows 10 22H2 for 32-bit Systems
Microsoft Windows 10 21H2 for x64-based Systems
Microsoft Windows 10 21H2 for ARM64-based Systems
Microsoft Windows 10 21H2 for 32-bit Systems
Microsoft Windows 10 1809 for x64-based Systems
Microsoft Windows 10 1809 for 32-bit Systems
Microsoft Windows 10 1607 for x64-based Systems
Microsoft Windows 10 1607 for 32-bit Systems
Microsoft Windows 11 23H2 for x64-based Systems
Microsoft Windows 11 23H2 for ARM64-based Systems
Microsoft Windows 11 22H2 for x64-based Systems
Microsoft Windows 11 22H2 for ARM64-based Systems
描述:
CVE(CAN) ID: CVE-2025-54101

Microsoft Windows SMB Client用于通过SMB(服务器消息块)协议与服务器进行通信,是访问共享资源(如文件、打印机等)的客户端软件。
Microsoft Windows SMB Client存在远程代码执行漏洞,攻击者可利用该漏洞在目标主机上执行代码。

<**>

建议:
厂商补丁:

Microsoft
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54101

浏览次数:26
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障