Microsoft’s Graphics Device Interface (GDI) has multiple vulnerabilities that enable remote attackers to execute arbitrary code or steal sensitive data by exploiting flaws in Enhanced Metafile (EMF) formats. Disclosed by Check Point, these issues, such as CVE-2025-53766, affect Windows 10 and 11, as well as Office applications. Remote code execution risks arise from improper handling of EMF+ records, allowing attackers to exploit manipulated files without user interaction.
The vulnerabilities present significant risks due to their severity ratings and potential for exploitation, particularly in network environments. Microsoft has patched these issues, yet they underline the ongoing dangers posed by legacy graphics processing vulnerabilities. Recommendations for users include applying updates immediately and using sandboxed viewers in untrusted contexts for document processing. The ongoing fuzzing efforts indicate that subtle parsing errors can evade notice for extended periods, necessitating continued vigilance as remote work and cloud services increase dependencies on such technologies.
👉 Pročitaj original: Cyber Security News