{"id":1052,"date":"2025-07-10T07:20:17","date_gmt":"2025-07-10T07:20:17","guid":{"rendered":"https:\/\/inforb-wp.demo.certsign.ro\/?p=1052"},"modified":"2025-07-10T07:27:31","modified_gmt":"2025-07-10T07:27:31","slug":"microsoft-lanseaza-actualizarea-de-securitate-iulie-2025","status":"publish","type":"post","link":"https:\/\/inforb.ro\/en\/microsoft-lanseaza-actualizarea-de-securitate-iulie-2025\/","title":{"rendered":"Microsoft Releases Security Update \u2013 July 2025"},"content":{"rendered":"<article style=\"display: flex; flex-wrap: wrap; align-items: flex-start; gap: 20px; margin-bottom: 40px;\">\n  <div style=\"flex: 1 1 60%; min-width: 280px;\">\n    <p><em>Publicat: 9 iulie 2025<\/em><\/p>\n\n    <p>Microsoft a lansat suita lunar\u0103 de actualiz\u0103ri de securitate \u201ePatch Tuesday\u201d pentru luna iulie 2025, remediind un total de <strong>130 de vulnerabilit\u0103\u021bi<\/strong> ce afecteaz\u0103 componente critice din Windows, Office, Azure, SQL Server \u0219i alte produse.<\/p>\n\n    <h3>\ud83d\udd10 Detalii esen\u021biale<\/h3>\n    <ul>\n      <li>14 vulnerabilit\u0103\u021bi sunt clasificate <strong>critice<\/strong> \u2013 majoritatea permi\u021b\u00e2nd execu\u021bie de cod de la distan\u021b\u0103 (RCE);<\/li>\n      <li>53 de vulnerabilit\u0103\u021bi permit escaladarea privilegiilor;<\/li>\n      <li>Vulnerabilit\u0103\u021bile <strong>CVE-2025-49719<\/strong> (SQL Server \u2013 information disclosure) \u0219i <strong>CVE-2025-47981<\/strong> (SPNEGO \u2013 RCE de tip \u201ewormable\u201d) sunt cele mai sensibile;<\/li>\n      <li>Nu au fost semnalate exploat\u0103ri active la momentul public\u0103rii, pentru prima dat\u0103 dup\u0103 11 luni consecutive.<\/li>\n    <\/ul>\n\n    <h3>\ud83d\udccc Recomand\u0103ri pentru administratori IT<\/h3>\n    <ul>\n      <li>Prioritizarea patch-urilor pentru SPNEGO \u0219i SQL Server;<\/li>\n      <li>Aplicarea actualiz\u0103rilor cumulative pentru Windows, Office, Edge, Teams, Visual Studio etc.;<\/li>\n      <li>Evaluarea \u0219i limitarea vectorilor de atac prin Remote Access (RRAS) sau preview pane-uri \u00een Outlook\/SharePoint.<\/li>\n    <\/ul>\n\n    <p><strong>Surs\u0103 oficial\u0103:<\/strong>\n      <a href=\"https:\/\/thehackernews.com\/2025\/07\/microsoft-patches-130-vulnerabilities.html\" target=\"_blank\" rel=\"noopener noreferrer\">\n        The Hacker News \u2013 Microsoft Patches 130 Vulnerabilities, Including Critical Flaws\n      <\/a>\n    <\/p>\n  <\/div>\n\n  <div style=\"flex: 1 1 35%; min-width: 240px; text-align: center;\">\n    <img decoding=\"async\" src=\"https:\/\/inforb.ro\/wp-content\/uploads\/2025\/07\/Win-up2date.jpg\"\n         alt=\"Windows Update - iulie 2025\"\n         style=\"max-width: 100%; height: auto; padding: 5px; border: 1px solid #ddd; box-shadow: 0 2px 6px rgba(0,0,0,0.1);\">\n  <\/div>\n<\/article>","protected":false},"excerpt":{"rendered":"<p>Publicat: 9 iulie 2025 Microsoft a lansat suita lunar\u0103 de actualiz\u0103ri de securitate \u201ePatch Tuesday\u201d pentru luna iulie 2025, remediind un total de 130 de vulnerabilit\u0103\u021bi ce afecteaz\u0103 componente critice din Windows, Office, Azure, SQL Server \u0219i alte produse. \ud83d\udd10 Detalii esen\u021biale 14 vulnerabilit\u0103\u021bi sunt clasificate critice \u2013 majoritatea permi\u021b\u00e2nd execu\u021bie de cod de la [&hellip;]<\/p>","protected":false},"author":3,"featured_media":1037,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,5,47,48],"tags":[],"class_list":["post-1052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-important","category-microsoft","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/1052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/comments?post=1052"}],"version-history":[{"count":1,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/1052\/revisions"}],"predecessor-version":[{"id":1053,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/posts\/1052\/revisions\/1053"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/media\/1037"}],"wp:attachment":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/media?parent=1052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/categories?post=1052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/tags?post=1052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}