CISA warns high-severity Windows SMB flaw now exploited in attacks, so update now
Date:
Wed, 22 Oct 2025 14:27:00 +0000
Description:
Windows 10, 11 and Server users should update to protect against this SMB vulnerability.
FULL STORY ======================================================================CVE-2025 -33073 sees Windows users face an SMB vulnerability Microsoft issued a fix in June 2025 make sure youre up to date Googles researchers were among those
who discovered it
Microsoft has acknowledged older versions of Windows 10, Windows 11 and Windows Server could be exploited due to a vulnerability related to SMB.
The vulnerability, tracked as CVE-2025-33073 with a score of 8.8, was added
to Americas Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) list on October 20.
Thankfully, Microsoft has already issued a fix for this, so anybody who applied June 2025s Patch Tuesday update should be safe, but those who havent should act promptly. CISA says this Microsoft vulnerability has been
exploited
The bug comes from improper access controls in SMB (Server Message Block), which allows users and applications to access files or folders on remote systems as if they were local. For example, files and printers can be shared between computers.
An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate, CISA wrote .
Successful attacks cold grant system-level privileges.
Microsoft has not commented on the new of exploitation, however the company did already fix the issue, so its on users to ensure that theyre updated.
Besides installing all updates not just the June patch to maintain maximum protection against bugs and vulnerabilities, users can monitor for unusual outbound SMB traffic in this instance.
Restricting SMB exposure to just trusted networks would also minimize potential leaks.
Microsoft credited researchers from CrowdStrike, Googles Project Zero and
more for bringing the issue to light.
Cybersecurity company Vicarius has published a detection script to identify whether a users Windows version is affected by the CVE, if SMB signing is enabled, and to detail a fix.
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the
Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.
======================================================================
Link to news story:
https://www.techradar.com/pro/security/cisa-warns-high-severity-windows-smb-fl aw-now-exploited-in-attacks-so-update-now
--- Mystic BBS v1.12 A49 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)