🔴 HIGHadvisory

Microsoft GDI Vulnerabilities - RCE & Info Leak Patched

Check Point Research uncovered three GDI flaws in Windows that live in the rendering pipeline—any preview, thumbnail, or browser render can trigger them. What's nasty: CVE-2025-30388 (important severity, more likely exploited) and CVE-2025-53766 (critical RCE) both exploit crafted EMF+ metafiles to trigger out-of-bounds memory operations in GdiPlus.dll. CVE-2025-47984 is an info disclosure bug where specially crafted EMR_STARTDOC records can leak adjacent memory by forcing StringLengthWorkerW() to read past buffer boundaries. Microsoft patched these in May, July, and August 2025 Patch Tuesday releases. What's interesting: CVE-2025-47984 is actually an incomplete fix from CVE-2022-35837—the original patch only partially addressed the offset arithmetic issue, and CPR's fuzzing campaign caught it years later. The attack surface is huge: any Windows system that renders EMF/EMF+ content in browsers, preview handlers, imaging libraries, or thumbnail generation is vulnerable. Exploitation in CVE-2025-30388 lets attackers control the value written to memory via the EmfPlusARGB object's color field—meaning controlled out-of-bounds writes. Classic reminder that graphics parsers remain a durable attack surface across desktop and server deployments.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: RCE and data exposure via ubiquitous graphics routines can enable initial access through innocuous file previews, impacting workstation fleets and app servers. Defensive Priority: Expedite verification of May/July/August 2025 patches, restrict EMF/EMF+ from untrusted sources, and monitor for abnormal GDIPlus activity. Industry Implications: Document and imaging workflows remain a durable endpoint attack surface requiring content disarm/analysis and least-privilege rendering.

Strategic Intelligence Guidance

  • Confirm KB-level patch compliance on Windows builds that process EMF/EMF+; include gold images and VDI templates
  • Implement CDR or strip EMF/EMF+ from inbound email and web uploads in high-risk workflows
  • Create EDR detections for GDIPlus.dll crashes and suspicious thumbnail generation on servers
  • Harden user context by removing unnecessary local admin rights to reduce RCE blast radius

CVEs

CVE-2025-53766CVE-2025-30388CVE-2025-47984

Vendors

Microsoft

Threats

remote code executioninformation disclosure

Targets

Windows desktopWindows ServerVDI environments