Microsoft December 2025 Patch Tuesday addresses 3 zero-days, 56 flaws
Summary
Hide ▲
Show ▼
Microsoft's December 2025 Patch Tuesday addresses 56 vulnerabilities, including three zero-days. One zero-day (CVE-2025-62221) is actively exploited, allowing privilege escalation in Windows Cloud Files Mini Filter Driver. Two other zero-days (CVE-2025-64671, CVE-2025-54100) are publicly disclosed, affecting GitHub Copilot for JetBrains and PowerShell. The updates also fix 3 critical remote code execution vulnerabilities. Additionally, Microsoft released the KB5071546 extended security update for Windows 10 Enterprise LTSC and ESU program participants, addressing the same vulnerabilities and updating Windows 10 to build 19045.6691 and Windows 10 Enterprise LTSC 2021 to build 19044.6691. The update includes a fix for CVE-2025-54100, a remote code execution zero-day vulnerability in PowerShell, and introduces a confirmation prompt with a security warning for script execution risk when using the Invoke-WebRequest command in PowerShell 5.1. Microsoft patched a total of 1,275 CVEs in 2025, according to data compiled by Fortra. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-62221 to the Known Exploited Vulnerabilities (KEV) catalog, mandating FCEB agencies to apply the patch by December 30, 2025. The remaining two zero-days, CVE-2025-54100 and CVE-2025-64671, are part of a broader set of security vulnerabilities collectively named IDEsaster, affecting multiple AI coding platforms.
Timeline
-
09.12.2025 21:54 4 articles · 1d ago
Microsoft releases KB5071546 extended security update for Windows 10
Microsoft released the KB5071546 extended security update for Windows 10 Enterprise LTSC and ESU program participants. This update addresses 56 vulnerabilities, including three zero-day flaws, and updates Windows 10 to build 19045.6691 and Windows 10 Enterprise LTSC 2021 to build 19044.6691. The update includes a fix for CVE-2025-54100, a remote code execution zero-day vulnerability in PowerShell, and introduces a confirmation prompt with a security warning for script execution risk when using the Invoke-WebRequest command in PowerShell 5.1. Microsoft recommends using the -UseBasicParsing switch to prevent script code execution when using Invoke-WebRequest.
Show sources
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
09.12.2025 20:38 5 articles · 1d ago
Microsoft December 2025 Patch Tuesday addresses 3 zero-days, 57 flaws
Microsoft's December 2025 Patch Tuesday addresses 56 vulnerabilities, including three zero-days. One zero-day (CVE-2025-62221) is actively exploited, allowing privilege escalation in Windows Cloud Files Mini Filter Driver. Two other zero-days (CVE-2025-64671, CVE-2025-54100) are publicly disclosed, affecting GitHub Copilot for JetBrains and PowerShell. The updates also fix 3 critical remote code execution vulnerabilities. Additionally, Microsoft released the KB5071546 extended security update for Windows 10 Enterprise LTSC and ESU program participants, addressing the same vulnerabilities and updating Windows 10 to build 19045.6691 and Windows 10 Enterprise LTSC 2021 to build 19044.6691. The update includes a fix for CVE-2025-54100, a remote code execution zero-day vulnerability in PowerShell, and introduces a confirmation prompt with a security warning for script execution risk when using the Invoke-WebRequest command in PowerShell 5.1. Microsoft patched a total of 1,275 CVEs in 2025, according to data compiled by Fortra. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-62221 to the Known Exploited Vulnerabilities (KEV) catalog, mandating FCEB agencies to apply the patch by December 30, 2025. The remaining two zero-days, CVE-2025-54100 and CVE-2025-64671, are part of a broader set of security vulnerabilities collectively named IDEsaster, affecting multiple AI coding platforms. CVE-2025-62221 is a kernel-mode use-after-free flaw in the Windows Cloud Files Mini Filter Driver that enables a low-privileged user to achieve system-level code execution. It can be chained with other vulnerabilities to achieve domain-wide compromise. CVE-2025-54100 allows an unauthenticated attacker to execute arbitrary code in the security context of a user who runs a crafted PowerShell command, such as Invoke-WebRequest. CVE-2025-64671 can be exploited via a malicious Cross Prompt Inject in untrusted files or MCP servers to execute additional commands by appending them to commands allowed in the user's terminal auto-approve setting.
Show sources
- Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws — www.bleepingcomputer.com — 09.12.2025 20:38
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
Information Snippets
-
Microsoft fixed 57 vulnerabilities in total, including 28 Elevation of Privilege, 19 Remote Code Execution, 4 Information Disclosure, 3 Denial of Service, and 2 Spoofing vulnerabilities.
First reported: 09.12.2025 20:384 sources, 5 articlesShow sources
- Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws — www.bleepingcomputer.com — 09.12.2025 20:38
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-62221 is an actively exploited Windows Cloud Files Mini Filter Driver Elevation of Privilege vulnerability.
First reported: 09.12.2025 20:384 sources, 4 articlesShow sources
- Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws — www.bleepingcomputer.com — 09.12.2025 20:38
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-64671 is a publicly disclosed GitHub Copilot for JetBrains Remote Code Execution vulnerability.
First reported: 09.12.2025 20:384 sources, 5 articlesShow sources
- Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws — www.bleepingcomputer.com — 09.12.2025 20:38
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-54100 is a publicly disclosed PowerShell Remote Code Execution vulnerability.
First reported: 09.12.2025 20:384 sources, 5 articlesShow sources
- Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws — www.bleepingcomputer.com — 09.12.2025 20:38
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
Microsoft attributed CVE-2025-62221 to Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC).
First reported: 09.12.2025 20:382 sources, 2 articlesShow sources
- Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws — www.bleepingcomputer.com — 09.12.2025 20:38
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
-
CVE-2025-64671 was disclosed by Ari Marzuk as part of his 'IDEsaster: A Novel Vulnerability Class in AI IDEs' report.
First reported: 09.12.2025 20:383 sources, 3 articlesShow sources
- Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws — www.bleepingcomputer.com — 09.12.2025 20:38
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
-
CVE-2025-54100 was attributed to multiple researchers, including Justin Necke, DeadOverflow, Pēteris Hermanis Osipovs, Anonymous, Melih Kaan Yıldız, and Osman Eren Güneş.
First reported: 09.12.2025 20:383 sources, 4 articlesShow sources
- Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flaws — www.bleepingcomputer.com — 09.12.2025 20:38
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
-
Microsoft released the KB5071546 extended security update for Windows 10 Enterprise LTSC and ESU program participants.
First reported: 09.12.2025 21:544 sources, 4 articlesShow sources
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
The update addresses 57 vulnerabilities, including three zero-day flaws, and updates Windows 10 to build 19045.6691 and Windows 10 Enterprise LTSC 2021 to build 19044.6691.
First reported: 09.12.2025 21:544 sources, 4 articlesShow sources
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
The update includes a fix for CVE-2025-54100, a remote code execution zero-day vulnerability in PowerShell.
First reported: 09.12.2025 21:544 sources, 4 articlesShow sources
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
PowerShell 5.1 now includes a confirmation prompt with a security warning for script execution risk when using the Invoke-WebRequest command.
First reported: 09.12.2025 21:544 sources, 4 articlesShow sources
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
Microsoft recommends using the -UseBasicParsing switch to prevent script code execution when using Invoke-WebRequest.
First reported: 09.12.2025 21:544 sources, 4 articlesShow sources
- Microsoft releases Windows 10 KB5071546 extended security update — www.bleepingcomputer.com — 09.12.2025 21:54
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
Microsoft patched 1,129 vulnerabilities in 2025, an 11.9% increase from 2024.
First reported: 10.12.2025 01:182 sources, 2 articlesShow sources
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
-
CVE-2025-62221 affects Windows 10 and later editions and is related to the Windows Cloud Files Mini Filter Driver.
First reported: 10.12.2025 01:183 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-62554 and CVE-2025-62557 are critical vulnerabilities in Microsoft Office that can be exploited by viewing a booby-trapped email message in the Preview Pane.
First reported: 10.12.2025 01:182 sources, 2 articlesShow sources
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-62562 is a critical vulnerability in Microsoft Outlook, but the Preview Pane is not an attack vector for this flaw.
First reported: 10.12.2025 01:182 sources, 2 articlesShow sources
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-62458, CVE-2025-62470, CVE-2025-62472, CVE-2025-59516, and CVE-2025-59517 are privilege escalation bugs considered likely to be exploited.
First reported: 10.12.2025 01:182 sources, 2 articlesShow sources
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-64671 is part of a broader security crisis called IDEsaster, affecting multiple AI coding platforms.
First reported: 10.12.2025 01:183 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-54100 affects Windows PowerShell on Windows Server 2008 and later.
First reported: 10.12.2025 01:183 sources, 3 articlesShow sources
- Microsoft Patch Tuesday, December 2025 Edition — krebsonsecurity.com — 10.12.2025 01:18
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
Microsoft patched a total of 1,275 CVEs in 2025, according to data compiled by Fortra.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
Tenable's Satnam Narang noted that 2025 marks the second consecutive year where Microsoft has patched over 1,000 CVEs.
First reported: 10.12.2025 10:501 source, 1 articleShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
-
Microsoft patched 17 vulnerabilities in its Chromium-based Edge browser since the release of the November 2025 Patch Tuesday update.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-62223 is a spoofing vulnerability in Edge for iOS with a CVSS score of 4.3.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-62221 to the Known Exploited Vulnerabilities (KEV) catalog, mandating FCEB agencies to apply the patch by December 30, 2025.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-54100 is a command injection vulnerability in Windows PowerShell that allows an unauthorized attacker to execute code locally.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-64671 is a command injection vulnerability in GitHub Copilot for JetBrains that allows an unauthorized attacker to execute code locally.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-64671 is part of a broader set of security vulnerabilities collectively named IDEsaster.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
Multiple IDEs were found vulnerable to the same attack as CVE-2025-64671, including Kiro.dev, Cursor, JetBrains Junie, Gemini CLI, Windsurf, and Roo Code.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
The same vulnerability as CVE-2025-64671 has also been discovered in GitHub Copilot for VS Code.
First reported: 10.12.2025 10:502 sources, 2 articlesShow sources
- Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days — thehackernews.com — 10.12.2025 10:50
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-62221 is a kernel-mode use-after-free flaw in the Windows Cloud Files Mini Filter Driver that enables a low-privileged user to achieve system-level code execution.
First reported: 10.12.2025 11:451 source, 1 articleShow sources
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-62221 can be chained with other vulnerabilities to achieve domain-wide compromise.
First reported: 10.12.2025 11:451 source, 1 articleShow sources
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-54100 allows an unauthenticated attacker to execute arbitrary code in the security context of a user who runs a crafted PowerShell command, such as Invoke-WebRequest.
First reported: 10.12.2025 11:451 source, 1 articleShow sources
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-64671 can be exploited via a malicious Cross Prompt Inject in untrusted files or MCP servers to execute additional commands by appending them to commands allowed in the user's terminal auto-approve setting.
First reported: 10.12.2025 11:451 source, 1 articleShow sources
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
Microsoft patched 19 Remote Code Execution (RCE) vulnerabilities and 28 Elevation of Privilege (EoP) flaws in the December 2025 Patch Tuesday.
First reported: 10.12.2025 11:451 source, 1 articleShow sources
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
Ivanti released patches for a stored XSS flaw (CVE-2025-10573) in Ivanti Endpoint Manager (EPM) with a CVSS score of 9.6.
First reported: 10.12.2025 11:451 source, 1 articleShow sources
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
-
CVE-2025-10573 allows an attacker with unauthenticated access to the primary EPM web service to join fake managed endpoints to the EPM server in order to poison the administrator web dashboard with malicious JavaScript.
First reported: 10.12.2025 11:451 source, 1 articleShow sources
- Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025 — www.infosecurity-magazine.com — 10.12.2025 11:45
Similar Happenings
Google Patches Two Exploited Android Framework Vulnerabilities
Google released December 2025 Android security updates addressing 107 vulnerabilities, including two Framework bugs (CVE-2025-48633, CVE-2025-48572) actively exploited in limited, targeted attacks. The updates also fixed a critical Framework flaw (CVE-2025-48631) enabling remote DoS without additional privileges. Patches are available in two levels (2025-12-01, 2025-12-05) for faster manufacturer adoption. The vulnerabilities affect Android versions 13, 14, 15, and 16, and the patches will address 56 additional vulnerabilities affecting Android components in the kernel or third-party components. Similar flaws in the past were used for targeted exploitation by commercial spyware or nation-state operations targeting a small number of high-interest individuals. The updates address four critical-severity fixes for elevation-of-privilege flaws in the Kernel's Pkvm and UOMMU subcomponents, and two critical fixes for Qualcomm-powered devices (CVE-2025-47319 and CVE-2025-47372). Samsung published its security bulletin, including ported fixes from the Google update and vendor-specific fixes. Devices on Android 10 and later may receive some crucial fixes via Google Play system updates. Play Protect can detect and block documented malware and attack chains, so users of any Android version should keep the component up to date and active.
W3 Total Cache WordPress Plugin Command Injection Vulnerability
A critical unauthenticated command injection vulnerability (CVE-2025-9501) in the W3 Total Cache WordPress plugin allows attackers to execute arbitrary PHP commands on the server by posting a malicious comment. The flaw affects versions prior to 2.8.13 and is actively being exploited. The developer released a patch on October 20, but hundreds of thousands of websites remain vulnerable. A proof-of-concept exploit is scheduled for public release on November 24.
Windows GDI Vulnerabilities Resurface
Three vulnerabilities in Windows Graphics Device Interface (GDI) were disclosed, enabling remote code execution and information disclosure. These flaws, identified as CVE-2025-30388, CVE-2025-53766, and CVE-2025-47984, were rooted in gdiplus.dll and gdi32full.dll. They were addressed by Microsoft in Patch Tuesday updates in May, July, and August 2025. The vulnerabilities involved out-of-bounds memory access triggered through malformed enhanced metafile (EMF) and EMF+ records, leading to memory corruption during image rendering. These issues highlight the persistent nature of security vulnerabilities, which can remain undetected for years and resurface due to incomplete fixes. The challenges in verifying the thoroughness and effectiveness of security patches are also emphasized.
Critical WSUS RCE Vulnerability Exploited in the Wild
A critical remote code execution (RCE) vulnerability (CVE-2025-59287) in Windows Server Update Service (WSUS) is being actively exploited in the wild. The flaw allows attackers to run malicious code with SYSTEM privileges on Windows servers with the WSUS Server role enabled. Microsoft has released out-of-band patches for all affected Windows Server versions. Cybersecurity firms have observed exploitation attempts and the presence of publicly available proof-of-concept exploit code. The vulnerability is considered potentially wormable between WSUS servers and poses a significant risk to organizations. The flaw concerns a case of deserialization of untrusted data in WSUS. The vulnerability was discovered and reported by security researchers MEOW, f7d8c52bec79e42795cf15888b85cbad, and Markus Wulftange with CODE WHITE GmbH. CISA and NSA, along with international partners, have issued guidance to secure Microsoft Exchange Server instances, including recommendations to restrict administrative access, implement multi-factor authentication, and enforce strict transport security configurations. The agencies advise decommissioning end-of-life on-premises or hybrid Exchange servers after transitioning to Microsoft 365. Sophos reported threat actors exploiting the vulnerability to harvest sensitive data from U.S. organizations across various industries, with at least 50 victims identified. The exploitation activity was first detected on October 24, 2025, a day after Microsoft issued the update. Attackers use Base64-encoded PowerShell commands to exfiltrate data to a webhook[.]site endpoint. Michael Haag of Splunk noted an alternate attack chain involving the Microsoft Management Console binary (mmc.exe) to trigger cmd.exe execution. Recently, threat actors have been exploiting CVE-2025-59287 to distribute ShadowPad malware, a modular backdoor used by Chinese state-sponsored hacking groups. Attackers used PowerCat, certutil, and curl to obtain a system shell and download ShadowPad. The malware is launched via DLL side-loading and comes with anti-detection and persistence techniques.
Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 183 flaws
Microsoft's October 2025 Patch Tuesday marks the end of free security updates for Windows 10, with the release of the final cumulative update KB5066791. This update addresses 183 vulnerabilities, including six zero-day flaws, and is mandatory for all Windows 10 users. Extended Security Updates (ESU) are available for purchase for up to three years for enterprise users and one year for consumers. The patches cover a range of vulnerabilities, including critical remote code execution and elevation of privilege issues. The zero-day vulnerabilities affect various components, such as Windows SMB Server, Microsoft SQL Server, Windows Agere Modem Driver, Windows Remote Access Connection Manager, AMD EPYC processors, and TCG TPM 2.0. Some of these flaws have been publicly disclosed or actively exploited. The update also includes fixes for vulnerabilities in third-party components, such as IGEL OS and AMD EPYC processors. Additionally, Microsoft Office users should be aware of CVE-2025-59227 and CVE-2025-59234, which exploit the Preview Pane. The update is the largest on record for Microsoft, with 183 CVEs, pushing the number of unique vulnerabilities released so far this year to more than 1,021. The update includes fixes for a wide range of vulnerabilities, including remote code execution (RCE), elevation of privilege, data theft, denial of service (DoS), and security feature bypass issues. The update also marks the end of life for Windows 10, meaning Microsoft will no longer issue regular patches for vulnerabilities in the operating system as part of its regular Patch Tuesday updates. Exchange Server 2016, Exchange Server 2019, Skype for Business 2016, Windows 11 IoT Enterprise Version 22H2, and Outlook 2016 are also reaching end-of-life. Windows 10 users can opt for Extended Security Updates (ESU) for one year at a cost of $30, or install Linux as an alternative. Linux Mint is recommended for Windows 10 users transitioning to Linux, with compatibility for most computers from the last decade. The October 2025 Windows security updates cause smart card authentication and certificate issues across all Windows 10, Windows 11, and Windows Server releases. The issue is due to a security fix designed to address a security feature bypass vulnerability (CVE-2024-30098) in the Windows Cryptographic Services. Affected users may experience various symptoms, including the inability to sign documents, failures in applications using certificate-based authentication, and smart cards not being recognized as CSP providers in 32-bit apps. The issue can be detected by the presence of Event ID 624 in the System event logs for the Smart Card Service prior to installing the October 2025 Windows security update. The fix is enabled by setting the DisableCapiOverrideForRSA registry key value to 1 to isolate cryptographic operations from the Smart Card implementation. Users experiencing authentication problems can manually resolve the issue by disabling the DisableCapiOverrideForRSA registry key. The DisableCapiOverrideForRSA registry key will be removed in April 2026, and users are advised to work with their application vendors to resolve the underlying problem. Microsoft also fixed another known issue breaking IIS websites and HTTP/2 localhost (127.0.0.1) connections after installing recent Windows security updates. Microsoft has released out-of-band (OOB) security updates for a critical-severity Windows Server Update Service (WSUS) vulnerability (CVE-2025-59287) with publicly available proof-of-concept exploit code. The vulnerability can be exploited remotely in low-complexity attacks that do not require user interaction, allowing threat actors without privileges to target vulnerable systems and run malicious code with SYSTEM privileges. Microsoft has released security updates for all impacted Windows Server versions, including Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2012. Workarounds for admins who can't immediately install these emergency patches include disabling the WSUS Server Role or blocking all inbound traffic to Ports 8530 and 8531 on the host firewall. The OOB update supersedes all previous updates for affected versions, and users are advised to install it as soon as possible.