Microsoft September 2025 Patch Tuesday addresses 81 vulnerabilities, including two zero-days
Summary
Hide ▲
Show ▼
Microsoft's November 2025 Patch Tuesday addressed 63 vulnerabilities, including one actively exploited zero-day vulnerability (CVE-2025-62215), a critical Remote Code Execution flaw (CVE-2025-60724), and several other notable vulnerabilities. The updates also included fixes for multiple elevation of privilege, remote code execution, information disclosure, denial-of-service, and spoofing vulnerabilities. Microsoft has released the first extended security update (ESU) for Windows 10, advising users to upgrade to Windows 11 or enroll in the ESU program. The KB5068781 update, the first Windows 10 extended security update since the operating system reached end of support on October 14, 2025, includes fixes for 63 flaws and one actively exploited elevation-of-privilege vulnerability. The September 2025 Patch Tuesday addressed 80 vulnerabilities, including 13 critical vulnerabilities. The updates fixed a range of issues, including privilege escalation, remote code execution, information disclosure, and denial-of-service vulnerabilities. The patches also covered a critical flaw in Azure Networking and addressed a new lateral movement technique dubbed BitLockMove. Additionally, security updates were released by multiple vendors, including Adobe, Cisco, Google, and others. The September 2025 update included 38 elevation of privilege (EoP) vulnerabilities. The two zero-day vulnerabilities were CVE-2025-55234 in Windows SMB Server and CVE-2024-21907 in Microsoft SQL Server. The SMB vulnerability was exploited through relay attacks, while the SQL Server flaw involved improper handling of exceptional conditions in Newtonsoft.Json. The updates also included hardening features for SMB Server to mitigate relay attacks, with recommendations for administrators to enable auditing to assess compatibility issues. The KB5065429 cumulative update for Windows 10 22H2 and 21H2 included fourteen fixes or changes, addressing unexpected UAC prompts and severe lag and stuttering issues with NDI streaming software. The update enabled auditing SMB client compatibility for SMB Server signing and SMB Server EPA, and included an opt-in feature for administrators to allow outbound network traffic from Windows 10 devices. In February 2026, Microsoft released updates to fix six actively exploited zero-day vulnerabilities, three of which have been publicly disclosed. These include CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21525, and CVE-2026-21533. None of the actively exploited vulnerabilities are rated critical. In total, 25 CVEs disclosed by Microsoft were EoP, followed by remote code execution (12), spoofing (7), information disclosure (6), and security feature bypass (5). SAP also released 26 new security notes and one update to a previously released note, including critical vulnerabilities CVE-2026-0509 and CVE-2026-0488.
Timeline
-
11.02.2026 11:50 1 articles · 23h ago
Microsoft February 2026 Patch Tuesday fixes six zero-days
Microsoft's February 2026 Patch Tuesday addressed six actively exploited zero-day vulnerabilities, three of which have been publicly disclosed. These include CVE-2026-21510, CVE-2026-21513, CVE-2026-21514, CVE-2026-21519, CVE-2026-21525, and CVE-2026-21533. None of the actively exploited vulnerabilities are rated critical. In total, 25 CVEs disclosed by Microsoft were EoP, followed by remote code execution (12), spoofing (7), information disclosure (6), and security feature bypass (5). SAP also released 26 new security notes and one update to a previously released note, including critical vulnerabilities CVE-2026-0509 and CVE-2026-0488.
Show sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
11.11.2025 20:45 6 articles · 3mo ago
Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws
The November 2025 Patch Tuesday includes fixes for 29 Elevation of Privilege Vulnerabilities, 2 Security Feature Bypass Vulnerabilities, 16 Remote Code Execution Vulnerabilities, 11 Information Disclosure Vulnerabilities, 3 Denial of Service Vulnerabilities, and 2 Spoofing Vulnerabilities. The actively exploited zero-day vulnerability is CVE-2025-62215, a Windows Kernel Elevation of Privilege Vulnerability with a CVSS score of 7.0. CVE-2025-62215 is a race-condition and double-free flaw that enables a locally accessible, low-privileged attacker to corrupt kernel memory and escalate to system privileges. The attack requires local code execution or local access and successful timing of a race, which is complex and fragile and typically needs pool grooming and concurrent threads. The attacker only needs low privileges and no other user interaction. When chained with other vulnerabilities, the CVE becomes a critical threat, potentially enabling server compromise, mass credential exposure, lateral movement, and ransomware deployment. The update also addresses CVE-2025-60724, a critical Remote Code Execution (RCE) flaw in the GDI+ Windows graphics component with a CVSS score of 9.8. CVE-2025-60724 can be triggered by uploading a file to a public-facing web application, making any system that processes user-supplied documents at risk. The update also includes fixes for CVE-2025-60704, a high-severity privilege escalation flaw in Windows Kerberos, codenamed CheckSum by researchers. The update also addresses CVE-2025-62220, a vulnerability affecting Windows Subsystem for Linux GUI, enabling Remote Code Execution with a CVSS score of 8.8. The update also includes fixes for CVE-2025-60719, CVE-2025-62213, and CVE-2025-62217, vulnerabilities affecting the Windows Ancillary Function Driver of WinSock, enabling privilege escalation with a CVSS score of 7.0 each.
Show sources
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
10.09.2025 14:14 3 articles · 5mo ago
Microsoft highlights upcoming end-of-life for Windows 10 and MFA for Azure
The update highlights the upcoming end-of-life date for Windows 10 and the next phase of mandatory multifactor authentication (MFA) for Azure, both scheduled for October. The update includes fixes for 12 vulnerabilities in Microsoft's Chromium-based Edge browser, including a security bypass bug (CVE-2025-53791). The update addresses two privilege escalation vulnerabilities in Windows BitLocker (CVE-2025-54911 and CVE-2025-54912) and a security flaw in Newtonsoft.Json (CVE-2024-21907) affecting SQL Server. The update also addresses four previously patched BitLocker vulnerabilities collectively called BitUnlocker.
Show sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
09.09.2025 23:48 7 articles · 5mo ago
Microsoft highlights upcoming end-of-life for Windows 10 and MFA for Azure
Microsoft released an out-of-band update (KB5071959) to address an issue in the Windows 10 Consumer Extended Security Update (ESU) enrollment process. The KB5071959 update resolves an issue where the enrollment wizard may fail during enrollment, allowing consumer devices to successfully enroll in ESU using the ESU wizard.
Show sources
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
09.09.2025 20:43 9 articles · 5mo ago
Microsoft September 2025 Patch Tuesday addresses 81 vulnerabilities, including two zero-days
The September 2025 Patch Tuesday addresses 80 vulnerabilities, including 13 critical vulnerabilities. The updates fix a range of issues, including privilege escalation, remote code execution, information disclosure, and denial-of-service vulnerabilities. The patches also cover a critical flaw in Azure Networking and address a new lateral movement technique dubbed BitLockMove. The update includes fixes for 12 vulnerabilities in Microsoft's Chromium-based Edge browser, including a security bypass bug (CVE-2025-53791). The update addresses two privilege escalation vulnerabilities in Windows BitLocker (CVE-2025-54911 and CVE-2025-54912) and a security flaw in Newtonsoft.Json (CVE-2024-21907) affecting SQL Server. The update also addresses four previously patched BitLocker vulnerabilities collectively called BitUnlocker. Microsoft has released the final non-security preview update for Windows 10, version 22H2, which includes fixes for the out-of-box experience and SMBv1 protocol connectivity. The update improves the servicing stack, updating Windows 10 22H2 systems to build 19045.6396. It also addresses an issue causing non-admin users to receive unexpected User Account Control (UAC) prompts and fixes delays or uneven audio and video performance issues with Network Device Interface (NDI) streaming. The update includes fixes and quality improvements from the KB5065429 cumulative update, enabling support for IT administrators to deploy hardening measures for SMB.
Show sources
- Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days — www.bleepingcomputer.com — 09.09.2025 20:43
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
Information Snippets
-
Microsoft's September 2025 Patch Tuesday addresses 81 vulnerabilities.
First reported: 09.09.2025 20:434 sources, 7 articlesShow sources
- Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days — www.bleepingcomputer.com — 09.09.2025 20:43
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The updates include fixes for two publicly disclosed zero-day vulnerabilities.
First reported: 09.09.2025 20:434 sources, 7 articlesShow sources
- Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days — www.bleepingcomputer.com — 09.09.2025 20:43
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Nine critical vulnerabilities are addressed, including five remote code execution flaws.
First reported: 09.09.2025 20:433 sources, 3 articlesShow sources
- Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days — www.bleepingcomputer.com — 09.09.2025 20:43
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-55234 is an elevation of privilege vulnerability in Windows SMB Server exploited through relay attacks.
First reported: 09.09.2025 20:434 sources, 6 articlesShow sources
- Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days — www.bleepingcomputer.com — 09.09.2025 20:43
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2024-21907 is a vulnerability in Newtonsoft.Json affecting Microsoft SQL Server, involving improper handling of exceptional conditions.
First reported: 09.09.2025 20:434 sources, 6 articlesShow sources
- Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days — www.bleepingcomputer.com — 09.09.2025 20:43
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The patches include hardening features for SMB Server to mitigate relay attacks.
First reported: 09.09.2025 20:434 sources, 7 articlesShow sources
- Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days — www.bleepingcomputer.com — 09.09.2025 20:43
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Administrators are recommended to enable auditing on SMB servers to assess compatibility issues with hardening features.
First reported: 09.09.2025 20:434 sources, 7 articlesShow sources
- Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days — www.bleepingcomputer.com — 09.09.2025 20:43
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The KB5065429 cumulative update for Windows 10 22H2 and 21H2 includes fourteen fixes or changes.
First reported: 09.09.2025 20:573 sources, 6 articlesShow sources
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update addresses unexpected UAC prompts and severe lag and stuttering issues with NDI streaming software.
First reported: 09.09.2025 20:573 sources, 6 articlesShow sources
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Windows 10 22H2 will be updated to build 19045.6332, and Windows 10 21H2 to build 19044.6332.
First reported: 09.09.2025 20:573 sources, 4 articlesShow sources
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update enables auditing SMB client compatibility for SMB Server signing and SMB Server EPA.
First reported: 09.09.2025 20:573 sources, 5 articlesShow sources
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update includes an opt-in feature for administrators to allow outbound network traffic from Windows 10 devices.
First reported: 09.09.2025 20:573 sources, 6 articlesShow sources
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Windows Backup for Organizations is now generally available.
First reported: 09.09.2025 20:573 sources, 3 articlesShow sources
- Windows 10 KB5065429 update includes 14 changes and fixes — www.bleepingcomputer.com — 09.09.2025 20:57
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The September 2025 update includes 38 elevation of privilege (EoP) vulnerabilities.
First reported: 09.09.2025 23:484 sources, 6 articlesShow sources
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-55234 is an elevation of privilege vulnerability with a CVSS score of 8.8.
First reported: 09.09.2025 23:483 sources, 5 articlesShow sources
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-54918 in Windows NT LAN Manager (NTLM) is marked as critical and has a CVSS score of 8.8.
First reported: 09.09.2025 23:483 sources, 5 articlesShow sources
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-54111 and CVE-2025-54913 are EoP vulnerabilities in Windows UI XAML.
First reported: 09.09.2025 23:483 sources, 5 articlesShow sources
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-55232 in the Microsoft High Performance Compute (HPC) Pack has a CVSS score of 9.8.
First reported: 09.09.2025 23:483 sources, 5 articlesShow sources
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-54916 in Windows NTFS has a CVSS score of 7.8 and can be exploited through SMB or local parsing routines.
First reported: 09.09.2025 23:483 sources, 5 articlesShow sources
- EoP Flaws Again Lead Microsoft Patch Day — www.darkreading.com — 09.09.2025 23:48
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The September 2025 Patch Tuesday addresses 80 vulnerabilities, including one publicly disclosed flaw.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Eight vulnerabilities are rated Critical, and 72 are rated Important.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
None of the vulnerabilities have been exploited in the wild as zero-days.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Thirty-eight of the disclosed flaws are related to privilege escalation.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update includes fixes for 12 vulnerabilities in Microsoft's Chromium-based Edge browser.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update addresses a security bypass bug (CVE-2025-53791) in the Edge browser.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update includes a critical flaw in Azure Networking (CVE-2025-54914) with a CVSS score of 10.0.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update addresses two privilege escalation vulnerabilities in Windows BitLocker (CVE-2025-54911 and CVE-2025-54912).
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update addresses a security flaw in Newtonsoft.Json (CVE-2024-21907) affecting SQL Server.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update addresses four previously patched BitLocker vulnerabilities collectively called BitUnlocker.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update addresses a new lateral movement technique dubbed BitLockMove.
First reported: 10.09.2025 00:212 sources, 4 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Security updates have been released by multiple vendors, including Adobe, Cisco, Google, and others.
First reported: 10.09.2025 00:213 sources, 5 articlesShow sources
- Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs — thehackernews.com — 10.09.2025 14:14
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft has released the final non-security preview update for Windows 10, version 22H2.
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update includes fixes for the out-of-box experience and SMBv1 protocol connectivity.
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
KB5066198 addresses a known issue impacting SMBv1 shares over the NetBIOS over TCP/IP (NetBT) networking protocol.
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update resolves an issue with Windows Autopilot and the Enrollment Status Page (ESP) during the Out-of-Box Experience (OOBE).
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update improves the servicing stack, updating Windows 10 22H2 systems to build 19045.6396.
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update includes fixes and quality improvements from the KB5065429 cumulative update.
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update enables support for IT administrators to deploy hardening measures for SMB.
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update addresses an issue causing non-admin users to receive unexpected User Account Control (UAC) prompts.
First reported: 10.09.2025 00:213 sources, 5 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The update fixes delays or uneven audio and video performance issues with Network Device Interface (NDI) streaming.
First reported: 10.09.2025 00:213 sources, 5 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft will stop providing security updates for Windows 10 after October 14, 2025.
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The Extended Security Updates (ESU) program is available for Windows 10 users to delay the switch to Windows 11.
First reported: 10.09.2025 00:213 sources, 5 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Individual customers in the European Economic Area (EEA) can enroll in the ESU program for free.
First reported: 10.09.2025 00:213 sources, 5 articlesShow sources
- Microsoft releases the final Windows 10 22H2 preview update — www.bleepingcomputer.com — 26.09.2025 16:32
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The September 2025 Patch Tuesday addresses 80 vulnerabilities, including 13 critical vulnerabilities.
First reported: 10.09.2025 00:212 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-54918 in Windows NTLM is exploitable over the network or the Internet, allowing attackers to gain SYSTEM-level privileges.
First reported: 10.09.2025 00:212 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-55234 in Windows SMB client is a publicly disclosed vulnerability that can be exploited through relay attacks.
First reported: 10.09.2025 00:212 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-54916 in Windows NTFS can lead to remote code execution, requiring an attacker to run code on the host or convince a user to run a malicious file.
First reported: 10.09.2025 00:212 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Nearly half of the vulnerabilities fixed by Microsoft this month are privilege escalation flaws.
First reported: 10.09.2025 00:212 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Google fixed two zero-day vulnerabilities in Android on September 3, 2025.
First reported: 10.09.2025 00:213 sources, 4 articlesShow sources
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Apple patched its seventh zero-day of the year, used in an advanced spyware campaign targeting Apple devices.
First reported: 10.09.2025 00:212 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft will discontinue free security updates for Windows 10 computers in October 2025.
First reported: 10.09.2025 00:212 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, September 2025 Edition — krebsonsecurity.com — 10.09.2025 00:21
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft's November 2025 Patch Tuesday addresses 63 vulnerabilities, including one actively exploited zero-day vulnerability.
First reported: 11.11.2025 20:455 sources, 6 articlesShow sources
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The November 2025 Patch Tuesday includes fixes for 29 Elevation of Privilege Vulnerabilities, 2 Security Feature Bypass Vulnerabilities, 16 Remote Code Execution Vulnerabilities, 11 Information Disclosure Vulnerabilities, 3 Denial of Service Vulnerabilities, and 2 Spoofing Vulnerabilities.
First reported: 11.11.2025 20:455 sources, 6 articlesShow sources
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The actively exploited zero-day vulnerability is CVE-2025-62215, a Windows Kernel Elevation of Privilege Vulnerability.
First reported: 11.11.2025 20:455 sources, 6 articlesShow sources
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft has released the first extended security update (ESU) for Windows 10, advising users to upgrade to Windows 11 or enroll in the ESU program.
First reported: 11.11.2025 20:455 sources, 6 articlesShow sources
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft released an out-of-band update to fix a bug preventing enrollments in the ESU program.
First reported: 11.11.2025 20:455 sources, 6 articlesShow sources
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Other vendors who released updates or advisories in November 2025 include Adobe, Cisco, Google, Fortinet, Ivanti, runC, QNAP, SAP, and Samsung.
First reported: 11.11.2025 20:454 sources, 5 articlesShow sources
- Microsoft November 2025 Patch Tuesday fixes 1 zero-day, 63 flaws — www.bleepingcomputer.com — 11.11.2025 20:45
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft released the KB5068781 update, the first Windows 10 extended security update since the operating system reached end of support on October 14, 2025.
First reported: 11.11.2025 21:095 sources, 5 articlesShow sources
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Consumers can enroll in the ESU program by paying $30, using 1,000 Microsoft reward points, or using Windows Backup to synchronize their Windows settings with their Microsoft account.
First reported: 11.11.2025 21:095 sources, 5 articlesShow sources
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Individual customers in the European Economic Area (EEA) can enroll in the ESU program for free by logging in to Windows 10 with a Microsoft account or pay $30 to continue using a local account.
First reported: 11.11.2025 21:095 sources, 5 articlesShow sources
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Business customers can use the ESU program for a total of three years, bringing the total cost per device to $427.
First reported: 11.11.2025 21:095 sources, 5 articlesShow sources
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft released an emergency fix to resolve a bug that prevented some devices from enrolling in the ESU program.
First reported: 11.11.2025 21:095 sources, 5 articlesShow sources
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
After installing the KB5068781 update, Windows 10 ESU will be updated to build 19045.6575 and Windows 10 Enterprise LTSC 2021 will be updated to build 19044.6575.
First reported: 11.11.2025 21:095 sources, 5 articlesShow sources
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The KB5068781 update resolves a bug that erroneously stated Windows 10 LTSC devices have reached end of support, even though they receive support until January 2027.
First reported: 11.11.2025 21:095 sources, 5 articlesShow sources
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The KB5068781 update includes Microsoft's Patch Tuesday security updates, which fix 63 flaws and one actively exploited elevation-of-privilege vulnerability.
First reported: 11.11.2025 21:095 sources, 5 articlesShow sources
- Microsoft releases KB5068781 — The first Windows 10 extended security update — www.bleepingcomputer.com — 11.11.2025 21:09
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 is an actively exploited Windows Kernel Elevation of Privilege Vulnerability with a CVSS score of 7.5.
First reported: 11.11.2025 22:234 sources, 4 articlesShow sources
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60724 is a critical Remote Code Execution (RCE) flaw in the GDI+ Windows graphics component with a CVSS score of 9.8.
First reported: 11.11.2025 22:234 sources, 4 articlesShow sources
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60704 is a medium-severity elevation-of-privilege bug affecting Windows Kerberos, dubbed CheckSum by researchers.
First reported: 11.11.2025 22:234 sources, 4 articlesShow sources
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62220 is a vulnerability affecting Windows Subsystem for Linux GUI, enabling Remote Code Execution with a CVSS score of 8.8.
First reported: 11.11.2025 22:234 sources, 4 articlesShow sources
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60719, CVE-2025-62213, and CVE-2025-62217 are vulnerabilities affecting the Windows Ancillary Function Driver of WinSock, enabling privilege escalation with a CVSS score of 7.0 each.
First reported: 11.11.2025 22:234 sources, 4 articlesShow sources
- Patch Now: Microsoft Flags Zero-Day & Critical Zero-Click Bugs — www.darkreading.com — 11.11.2025 22:23
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 is a race-condition and double-free flaw that enables a locally accessible, low-privileged attacker to corrupt kernel memory and escalate to system privileges.
First reported: 12.11.2025 12:153 sources, 3 articlesShow sources
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 requires local code execution or local access and successful timing of a race, which is complex and fragile and typically needs pool grooming and concurrent threads.
First reported: 12.11.2025 12:153 sources, 3 articlesShow sources
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 can be chained with other vulnerabilities to become a critical threat, potentially enabling server compromise, mass credential exposure, lateral movement, and ransomware deployment.
First reported: 12.11.2025 12:153 sources, 3 articlesShow sources
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60724 is a critical RCE bug impacting the GDI+ (Graphics Device Interface) library, a core Windows component used for rendering 2D graphics, images, and text.
First reported: 12.11.2025 12:153 sources, 3 articlesShow sources
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60724 can be triggered by uploading a file to a public-facing web application, making any system that processes user-supplied documents at risk.
First reported: 12.11.2025 12:153 sources, 3 articlesShow sources
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft released an out-of-band update (KB5071959) to address an issue in the Windows 10 Consumer Extended Security Update (ESU) enrollment process.
First reported: 12.11.2025 12:153 sources, 3 articlesShow sources
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The KB5071959 update resolves an issue where the enrollment wizard may fail during enrollment, allowing consumer devices to successfully enroll in ESU using the ESU wizard.
First reported: 12.11.2025 12:153 sources, 3 articlesShow sources
- Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday — www.infosecurity-magazine.com — 12.11.2025 12:15
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 is a privilege escalation flaw in Windows Kernel with a CVSS score of 7.0.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 is exploited through a race condition in Windows Kernel.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 allows an attacker to elevate privileges locally.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 requires local code execution or local access and successful timing of a race condition.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62215 can be chained with other vulnerabilities to become a critical threat.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60724 is a heap-based buffer overflow flaw in Microsoft's Graphics Component with a CVSS score of 9.8.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-62220 is a heap-based buffer overflow flaw in Windows Subsystem for Linux GUI with a CVSS score of 8.8.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60704 is a high-severity privilege escalation flaw in Windows Kerberos with a CVSS score of 7.5.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60704 is codenamed CheckSum by Silverfort.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60704 allows an attacker to gain administrator privileges.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60704 is exploited through an adversary-in-the-middle (AitM) attack.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2025-60704 allows an attacker to impersonate arbitrary users and gain control over an entire domain.
First reported: 12.11.2025 12:212 sources, 2 articlesShow sources
- Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack — thehackernews.com — 12.11.2025 12:21
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
Microsoft released an out-of-band update (KB5071959) to address an issue in the Windows 10 Consumer Extended Security Update (ESU) enrollment process.
First reported: 16.11.2025 23:471 source, 1 articleShow sources
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
The KB5071959 update resolves an issue where the enrollment wizard may fail during enrollment, allowing consumer devices to successfully enroll in ESU using the ESU wizard.
First reported: 16.11.2025 23:471 source, 1 articleShow sources
- Microsoft Patch Tuesday, November 2025 Edition — krebsonsecurity.com — 16.11.2025 23:47
-
CVE-2026-21510 is a security feature bypass vulnerability in Windows Shell which enables unauthorized attackers to circumvent Windows SmartScreen and security prompt protections by tricking victims into clicking on a malicious link.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
CVE-2026-21513 is a security feature bypass vulnerability in the Microsoft MSHTML Framework, which is used by Windows and various applications to render HTML content. A crafted file can silently bypass Windows security prompts and trigger dangerous actions with a single click.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
CVE-2026-21514 is a security feature bypass vulnerability in Microsoft Word. Exploitation requires no privileges but the victim must open a malicious document.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
CVE-2026-21519 is an elevation of privilege (EoP) flaw in the Windows Desktop Window Manager (DWM) which allows attackers to turn basic access into full system control.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
CVE-2026-21525 is a denial-of-service vulnerability affecting the Windows Remote Access Connection Manager. Exploitation is local, requires no privileges, and does not rely on user interaction. An attacker with basic local access can repeatedly trigger the flaw to cause persistent service disruption.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
CVE-2026-21533 is an elevation of privilege (EoP) vulnerability in Windows Remote Desktop Services. Exploitation is local, requires only low privileges, and does not need user interaction.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
In total, 25 CVEs disclosed by Microsoft were EoP, followed by remote code execution (12), spoofing (7), information disclosure (6), and security feature bypass (5).
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
None of the actively exploited vulnerabilities are rated critical. Only five CVEs out of the 58 patched this month are critical.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
SAP released 26 new security notes and one update to a previously released note.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
CVE-2026-0509 is a missing authorization check vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform with a CVSS score of 9.6.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
CVE-2026-0488 is a code injection vulnerability in SAP CRM and SAP S/4HANA (Scripting Editor), which has a CVSS score of 9.9.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
-
A realistic attack chain for CVE-2026-0488 could start from attackers compromising a standard CRM user through phishing, password reuse, or endpoint compromise. Then, the attacker accesses the Scripting Editor-related functionality and leverages the generic call flaw, executing unauthorized database-level actions (SQL), resulting in broad control.
First reported: 11.02.2026 11:501 source, 1 articleShow sources
- Microsoft Fixes Six Zero Day Vulnerability in February Patch Tuesday — www.infosecurity-magazine.com — 11.02.2026 11:50
Similar Happenings
Microsoft February 2026 Patch Tuesday Addresses 6 Zero-Days and 59 Flaws
Microsoft's February 2026 Patch Tuesday addresses 59 vulnerabilities, including 6 actively exploited zero-days and 3 publicly disclosed flaws. The updates include fixes for 5 critical vulnerabilities, with three being security feature bypass flaws in various Microsoft products. The zero-days span components such as Windows Shell, MSHTML Framework, Microsoft Word, Desktop Window Manager, Windows Remote Access Connection Manager, and Windows Remote Desktop Services. Microsoft issued an out-of-band patch for one of the zero-days, CVE-2026-21514, highlighting its urgency. The updates also cover a range of other vulnerabilities, including elevation of privilege, security feature bypass, remote code execution, information disclosure, denial of service, and spoofing flaws. Additionally, Microsoft has begun rolling out updated Secure Boot certificates to replace expiring 2011 certificates. Other vendors, including Adobe, BeyondTrust, CISA, Cisco, Fortinet, Google, n8n, and SAP, have also released security updates or advisories.
Microsoft January 2026 Patch Tuesday Addresses 3 Zero-Days, 114 Flaws
Microsoft's January 2026 Patch Tuesday addressed 114 vulnerabilities, including three zero-days: one actively exploited (CVE-2026-20805) and two publicly disclosed (CVE-2026-21265 and CVE-2023-31096). The updates covered a range of flaw types, with eight classified as 'Critical,' including remote code execution and elevation-of-privilege vulnerabilities. Additionally, Microsoft released emergency out-of-band security updates to patch a high-severity Microsoft Office zero-day vulnerability (CVE-2026-21509) exploited in attacks, affecting multiple Office versions. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20805 and CVE-2026-21509 to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to apply the latest fixes by February 3, 2026, and February 16, 2026, respectively. The flaw was discovered by the Microsoft Threat Intelligence Center (MSTIC), the Microsoft Security Response Center (MSRC), and the Office Product Group Security Team, and affects several versions of Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps for Enterprise.
Critical ASUS Live Update Flaw Added to CISA KEV Catalog
CISA has added a critical flaw in ASUS Live Update (CVE-2025-59374, CVSS 9.3) to its KEV catalog due to active exploitation. The vulnerability stems from a supply chain compromise that allowed unauthorized modifications in certain versions, enabling attackers to perform unintended actions. The flaw is linked to the 2019 Operation ShadowHammer campaign by the APT41 group, which targeted around 600 specific devices. The attack was uncovered in January 2019, and Asus released a patch by March the same year. ASUS Live Update reached end-of-support on December 4, 2025, and CISA urges FCEB agencies to discontinue its use by January 7, 2026. The CVE assignment reflects a retrospective classification effort, formally documenting a well-known attack that predated CVE issuance. The updated ASUS FAQ page from December 2025 contradicts the CVE entry, implying that support definitively ended on December 4, 2025, with version 3.6.15 being the last version. The FAQ page continues to display older remediation guidance with screenshots bearing 2019 dates, recommending upgrading to version 3.6.8 or higher to resolve security concerns.
Microsoft December 2025 Patch Tuesday addresses 3 zero-days, 56 flaws
Microsoft's December 2025 Patch Tuesday addresses 56 vulnerabilities, including three zero-days. One zero-day (CVE-2025-62221) is actively exploited, allowing privilege escalation in Windows Cloud Files Mini Filter Driver. Two other zero-days (CVE-2025-64671, CVE-2025-54100) are publicly disclosed, affecting GitHub Copilot for JetBrains and PowerShell. The updates also fix 3 critical remote code execution vulnerabilities. Additionally, Microsoft released the KB5071546 extended security update for Windows 10 Enterprise LTSC and ESU program participants, addressing the same vulnerabilities and updating Windows 10 to build 19045.6691 and Windows 10 Enterprise LTSC 2021 to build 19044.6691. The update includes a fix for CVE-2025-54100, a remote code execution zero-day vulnerability in PowerShell, and introduces a confirmation prompt with a security warning for script execution risk when using the Invoke-WebRequest command in PowerShell 5.1. Microsoft patched a total of 1,275 CVEs in 2025, according to data compiled by Fortra. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-62221 to the Known Exploited Vulnerabilities (KEV) catalog, mandating FCEB agencies to apply the patch by December 30, 2025. The remaining two zero-days, CVE-2025-54100 and CVE-2025-64671, are part of a broader set of security vulnerabilities collectively named IDEsaster, affecting multiple AI coding platforms.
Microsoft to Strengthen Entra ID Sign-Ins Against Script Injection Attacks
Microsoft plans to enhance the security of Entra ID authentication by implementing a strengthened Content Security Policy (CSP) starting in mid-to-late October 2026. This update will allow script downloads only from Microsoft-trusted content delivery network domains and inline script execution only from Microsoft-trusted sources during sign-ins. The policy aims to protect users against cross-site scripting (XSS) attacks, where attackers inject malicious code to steal credentials or compromise systems. The update will apply only to browser-based sign-in experiences at URLs beginning with login.microsoftonline.com, excluding Microsoft Entra External ID. Microsoft urges organizations to test sign-in scenarios before the deadline to identify and address dependencies on code-injection tools. IT administrators can review sign-in flows in the browser developer console to identify violations. Enterprise customers are advised to stop using browser extensions and tools that inject code or scripts into sign-in pages before the change takes effect. This move is part of Microsoft's Secure Future Initiative (SFI), launched in November 2023, following a report by the Cyber Safety Review Board of the U.S. Department of Homeland Security. The initiative also includes updates to Microsoft 365 security defaults to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols, and the disabling of all ActiveX controls in Windows versions of Microsoft 365 and Office 2024 apps. Additionally, Microsoft has expanded its bug bounty program to cover all online services, including third-party and open-source components, if they impact Microsoft online services. The company has paid over $17 million in bounty awards to 344 security researchers over the last 12 months, and another $16.6 million to 343 security researchers during the previous year. Microsoft has deployed over 50 new detections in its infrastructure to target high-priority tactics, techniques, and procedures. The adoption of phishing-resistant multi-factor authentication (MFA) for users and devices has hit 99.6%. Microsoft has enforced Mandatory MFA across all services, including for all Azure service users. The company has also introduced Automatic recovery capabilities via Quick Machine Recovery, expanded passkey and Windows Hello support, and improved memory safety in UEFI firmware and drivers by using Rust. Microsoft has migrated 95% of Microsoft Entra ID signing VMs to Azure Confidential Compute and moved 94.3% of Microsoft Entra ID security token validation to its standard identity Software Development Kit (SDK). The company has discontinued the use of Active Directory Federation Services (ADFS) in its productivity environment and decommissioned 560,000 additional unused and aged tenants and 83,000 unused Microsoft Entra ID apps across Microsoft production and productivity environments. Microsoft has advanced threat hunting by centrally tracking 98% of production infrastructure, achieved complete network device inventory and mature asset lifecycle management, and almost entirely locked code signing to production identities. The company has published 1,096 CVEs, including 53 no-action cloud CVEs, and paid out $17 million in bounties. Microsoft plans to introduce smartphone-style app permission prompts in Windows 11 to request user consent before apps can access sensitive resources such as files, cameras, and microphones. The "Windows Baseline Security Mode" and "User Transparency and Consent" changes will prompt for permission when apps try to install unwanted software or access sensitive resources, allowing users to change their choices at any time. Baseline Security Mode will enable runtime integrity safeguards by default, ensuring that only properly signed apps, services, and drivers can run, but allowing users and IT administrators to override these safeguards for specific apps when needed.