CVE-2025-60724

Published Nov 11, 2025

Last updated 5 months ago

Overview

Description
Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
Source
secure@microsoft.com
NVD status
Analyzed
Products
office, office_long_term_servicing_channel, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_23h2, windows_11_24h2, windows_11_25h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025

Risk scores

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

secure@microsoft.com
CWE-122

Social media

Hype score
Not currently trending
  1. 🚨 Alerta Rodbol – Vulnerabilidad crítica en Windows (GDI+) Se ha identificado una vulnerabilidad crítica en el componente GDI+ de Windows, catalogada como CVE-2025-60724, que podría permitir la ejecución de código malicioso con solo abrir archivos o imágenes manipulad

    @RODBOLCOL

    24 Nov 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Microsoft's November security update addresses 63 unique CVEs, including one zero-day actively exploited flaw that could escalate privileges. Don't underestimate the critical CVE-2025-60724 affecting GDI+. How's your patching strategy? #Cybersecurity #Ciberseguridad https://t.co/

    @CyberDailyPost

    14 Nov 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. CVE-2025-60724: Microsoft Office LTSC for Mac critical vulnerability (CVSS 9.8). 9.8 severity on core productivity software suggests RCE via malicious document. macOS users often skip Office patches. Patch: https://t.co/u0PmTH44wd

    @gothburz

    14 Nov 2025

    194 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨 Microsoft's November Patch Tuesday is here, fixing a Windows Kernel zero-day (CVE-2025-62215) actively exploited for privilege escalation. A critical 9.8 CVSS GDI+ RCE flaw (CVE-2025-60724) also patched. Patch now! ⚠️ #PatchTuesday #CyberSecurity... 🔗 https://t.co/Gb

    @NetSecIO

    12 Nov 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Some increased actor activities are shown targeting Microsoft Windows (CVE-2025-60724) https://t.co/hZZ30N4viv

    @vuldb

    12 Nov 2025

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. [CVE-2025-60724: CRITICAL] Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.#cve,CVE-2025-60724,#cybersecurity https://t.co/7WaLlzkomY https://t.co/M56W5NHbI8

    @CveFindCom

    11 Nov 2025

    90 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. **CVE-2025-60724** is a **heap-based buffer overflow** vulnerability found in the **Microsoft Graphics Component**, which is integral to rendering graphics in Windows operating systems. This vulnerability allows unauthenticated remote attackers to execute arbitrary code over the

    @CveTodo

    11 Nov 2025

    66 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations

References

Sources include official advisories and independent security research.