Advisory

Microsoft October 2025 patch tuesday fixes 172 flaws including Zero-Days and actively exploited flaws

Take action: This advisory is important and urgent: Three zero-day vulnerabilities are being actively exploited in the wild. Patch your Windows Operating Systems ASAP, then Microsoft Office and Azure services tools. This is the final free security update for Windows 10. Make sure to update your Windows 10 until you manage to replace them. Then review the advisory for the rest of the Microsoft products and Windows components you use.


Learn More

Microsoft has released its October 2025 Patch Tuesday security updates, addressing 172 security vulnerabilities. This patch fixes critical flaws in Windows operating systems, Microsoft Office applications, Azure cloud services, Windows Server components, and enterprise software. 

This Patch Tuesday marks the end of support for Windows 10, and unless Microsoft changes their mind will be the last free security update for Windows 10 without Extended Security Updates.

Zero-day vulnerabilities that were publicly disclosed or actively exploited before official patches became available:

  • CVE-2025-24990 - Windows Agere Modem Driver Elevation of Privilege Vulnerability. Microsoft is removing an Agere Modem driver that was actively exploited to gain administrative privileges. The vulnerability affects all supported versions of Windows and can be exploited even if the modem is not actively being used. Microsoft has removed the ltmdm64.sys driver in the October cumulative update, though this will cause related Fax modem hardware to cease functioning.
  • CVE-2025-59230 - Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This actively exploited vulnerability involves improper access control in Windows Remote Access Connection Manager, allowing an authorized attacker to elevate privileges locally to SYSTEM level. Microsoft indicates that attackers must invest in some measurable amount of effort in preparation or execution to successfully exploit the flaw.
  • CVE-2025-47827 - Secure Boot Bypass in IGEL OS Before Version 11. This actively exploited vulnerability allows Secure Boot to be bypassed because the igel-flash-driver module improperly verifies cryptographic signatures. A crafted root filesystem can be mounted from an unverified SquashFS image, potentially enabling persistent malware installation. MITRE created this CVE on behalf of the affected parties, and the documented Windows updates incorporate updates from IGEL OS that address this vulnerability.
  • CVE-2025-0033 - AMD RMP Corruption During SNP Initialization. This publicly disclosed vulnerability affects AMD EPYC processors using Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP). It involves a race condition during Reverse Map Table (RMP) initialization that could allow a malicious or compromised hypervisor to modify RMP entries before they are locked, potentially impacting the integrity of SEV-SNP guest memory.
  • CVE-2025-24052 - Windows Agere Modem Driver Elevation of Privilege Vulnerability. This is a similar publicly disclosed flaw to CVE-2025-24990. Microsoft reiterates that the flaw impacts all versions of Windows and that the modem does not have to be actively used to exploit the vulnerability.
  • CVE-2025-2884 - Out-of-Bounds Read Vulnerability in TCG TPM2.0 Reference Implementation. This publicly disclosed vulnerability exists in the TCG TPM2.0 Reference implementation's CryptHmacSign helper function, which is vulnerable to out-of-bounds read due to lack of validation of the signature scheme with the signature key's algorithm. Successful exploitation could lead to information disclosure or denial of service of the TPM.

Critical vulnerabilities:

  1. CVE-2025-0033 - AMD CVE-2025-0033: RMP Corruption During SNP Initialization
  2. CVE-2025-59218 - Azure Entra ID Elevation of Privilege Vulnerability
  3. CVE-2025-59246 - Azure Entra ID Elevation of Privilege Vulnerability
  4. CVE-2025-55321 - Azure Monitor Log Analytics Spoofing Vulnerability
  5. CVE-2025-59247 - Azure PlayFab Elevation of Privilege Vulnerability
  6. CVE-2025-59292 - Azure Compute Gallery Elevation of Privilege Vulnerability
  7. CVE-2025-59291 - Confidential Azure Container Instances Elevation of Privilege Vulnerability
  8. CVE-2025-59272 - Copilot Spoofing Vulnerability
  9. CVE-2025-59252 - M365 Copilot Spoofing Vulnerability
  10. CVE-2025-59286 - Copilot Spoofing Vulnerability
  11. CVE-2016-9535 - MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability
  12. CVE-2025-49708 - Microsoft Graphics Component Elevation of Privilege Vulnerability
  13. CVE-2025-59227 - Microsoft Office Remote Code Execution Vulnerability
  14. CVE-2025-59234 - Microsoft Office Remote Code Execution Vulnerability
  15. CVE-2025-59236 - Microsoft Excel Remote Code Execution Vulnerability
  16. CVE-2025-59271 - Redis Enterprise Elevation of Privilege Vulnerability
  17. CVE-2025-59287 - Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
  18. CVE-2025-39943 - ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
  19. CVE-2025-39907 - mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer
  20. CVE-2025-39898 - e1000e: fix heap overflow in e1000_set_eeprom
  21. CVE-2025-39925 - can: j1939: implement NETDEV_UNREGISTER notification handler
  22. CVE-2025-39910 - mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()
  23. CVE-2025-49844 - Redis Lua Use-After-Free may lead to remote code execution

Other patches in Microsoft's October 2025 Patch Tuesday include 144 "Important" severity vulnerabilities spanning multiple product categories. 

The largest segment involved 80 elevation of privilege flaws affecting core Windows components including Windows Kernel with multiple vulnerabilities, Windows PrintWorkflowUserSvc with eight separate use-after-free vulnerabilities, Windows Bluetooth Service, Windows Connected Devices Platform Service, Azure Connected Machine Agent, Azure Monitor Agent, Windows Authentication Methods with three vulnerabilities, and various Windows driver components. 

Remote code execution vulnerabilities were addressed in multiple Microsoft Office applications, Windows Connected Devices Platform Service, Windows SMB Server, Remote Desktop Client, Remote Desktop Protocol, Windows URL Parsing, and various Inbox COM Objects. 

Full patch list

TagCVE IDCVE TitleSeverity
.NETCVE-2025-55247.NET Elevation of Privilege VulnerabilityImportant
.NET, .NET Framework, Visual StudioCVE-2025-55248.NET, .NET Framework, and Visual Studio Information Disclosure VulnerabilityImportant
Active Directory Federation ServicesCVE-2025-59258Windows Active Directory Federation Services (ADFS) Information Disclosure VulnerabilityImportant
Agere Windows Modem DriverCVE-2025-24990Windows Agere Modem Driver Elevation of Privilege VulnerabilityImportant
Agere Windows Modem DriverCVE-2025-24052Windows Agere Modem Driver Elevation of Privilege VulnerabilityImportant
AMD Restricted Memory PageCVE-2025-0033AMD CVE-2025-0033: RMP Corruption During SNP InitializationCritical
ASP.NET CoreCVE-2025-55315ASP.NET Security Feature Bypass VulnerabilityImportant
Azure Connected Machine AgentCVE-2025-47989Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
Azure Connected Machine AgentCVE-2025-58724Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
Azure Entra IDCVE-2025-59218Azure Entra ID Elevation of Privilege VulnerabilityCritical
Azure Entra IDCVE-2025-59246Azure Entra ID Elevation of Privilege VulnerabilityCritical
Azure LocalCVE-2025-55697Azure Local Elevation of Privilege VulnerabilityImportant
Azure MonitorCVE-2025-55321Azure Monitor Log Analytics Spoofing VulnerabilityCritical
Azure Monitor AgentCVE-2025-59285Azure Monitor Agent Elevation of Privilege VulnerabilityImportant
Azure Monitor AgentCVE-2025-59494Azure Monitor Agent Elevation of Privilege VulnerabilityImportant
Azure PlayFabCVE-2025-59247Azure PlayFab Elevation of Privilege VulnerabilityCritical
Confidential Azure Container InstancesCVE-2025-59292Azure Compute Gallery Elevation of Privilege VulnerabilityCritical
Confidential Azure Container InstancesCVE-2025-59291Confidential Azure Container Instances Elevation of Privilege VulnerabilityCritical
Connected Devices Platform Service (Cdpsvc)CVE-2025-59191Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Connected Devices Platform Service (Cdpsvc)CVE-2025-55326Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution VulnerabilityImportant
Connected Devices Platform Service (Cdpsvc)CVE-2025-58719Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CopilotCVE-2025-59272Copilot Spoofing VulnerabilityCritical
CopilotCVE-2025-59252M365 Copilot Spoofing VulnerabilityCritical
CopilotCVE-2025-59286Copilot Spoofing VulnerabilityCritical
Data Sharing Service ClientCVE-2025-59200Data Sharing Service Spoofing VulnerabilityImportant
GamesCVE-2025-59489MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerabilityImportant
GitHubCVE-2025-59288Playwright Spoofing VulnerabilityModerate
Inbox COM ObjectsCVE-2025-58735Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58732Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-59282Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58733Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58734Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58738Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58731Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58730Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58736Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Internet ExplorerCVE-2025-59295Windows URL Parsing Remote Code Execution VulnerabilityImportant
JDBC Driver for SQL ServerCVE-2025-59250JDBC Driver for SQL Server Spoofing VulnerabilityImportant
MarinerCVE-2025-39943ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transferCritical
MarinerCVE-2025-39946tls: make sure to abort the stream if headers are bogusModerate
MarinerCVE-2025-39942ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_sizeModerate
MarinerCVE-2025-39951um: virtio_uml: Fix use-after-free after put_device in probeModerate
MarinerCVE-2025-39932smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)Moderate
MarinerCVE-2025-39949qed: Don't collect too many protection override GRC elementsModerate
MarinerCVE-2025-39937net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointerModerate
MarinerCVE-2025-39955tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().Moderate
MarinerCVE-2025-39895sched: Fix sched_numa_find_nth_cpu() if mask offlineModerate
MarinerCVE-2025-11413GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-boundsModerate
MarinerCVE-2025-11414GNU Binutils Linker elflink.c get_link_hash_entry out-of-boundsModerate
MarinerCVE-2025-39938ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failedModerate
MarinerCVE-2025-11495GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflowModerate
MarinerCVE-2025-39934drm: bridge: anx7625: Fix NULL pointer dereference with early IRQModerate
MarinerCVE-2025-39929smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error pathModerate
MarinerCVE-2025-39945cnic: Fix use-after-free bugs in cnic_delete_taskImportant
MarinerCVE-2025-39907mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC bufferCritical
MarinerCVE-2025-39913tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.Moderate
MarinerCVE-2025-39952wifi: wilc1000: avoid buffer overflow in WID string configurationImportant
MarinerCVE-2025-39940dm-stripe: fix a possible integer overflowModerate
MarinerCVE-2025-39953cgroup: split cgroup_destroy_wq into 3 workqueuesModerate
MarinerCVE-2023-53469af_unix: Fix null-ptr-deref in unix_stream_sendpage().Important
MarinerCVE-2025-39914tracing: Silence warning when chunk allocation fails in trace_pid_writeModerate
MarinerCVE-2025-39905net: phylink: add lock for serializing concurrent pl->phydev writes with resolverModerate
MarinerCVE-2025-39920pcmcia: Add error handling for add_interval() in do_validate_mem()Moderate
MarinerCVE-2025-39911i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error pathLow
MarinerCVE-2025-39958iommu/s390: Make attach succeed when the device was surprise removedLow
MarinerCVE-2025-8291ZIP64 End of Central Directory (EOCD) Locator record offset not checkedModerate
MarinerCVE-2025-39957wifi: mac80211: increase scan_ies_len for S1GLow
MarinerCVE-2025-46818Redis: Authenticated users can execute LUA scripts as a different userModerate
MarinerCVE-2025-46817Lua library commands may lead to integer overflow and potential RCEImportant
MarinerCVE-2022-50502mm: /proc/pid/smaps_rollup: fix no vma's null-derefModerate
MarinerCVE-2025-39944octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()Important
MarinerCVE-2025-11234Qemu-kvm: vnc websocket handshake use-after-freeModerate
MarinerCVE-2025-49844Redis Lua Use-After-Free may lead to remote code executionCritical
MarinerCVE-2025-10729Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVGImportant
MarinerCVE-2025-39961iommu/amd/pgtbl: Fix possible race while increase page table levelModerate
MarinerCVE-2025-61984ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)Low
MarinerCVE-2025-46819Redis is vulnerable to DoS via specially crafted LUA scriptsModerate
MarinerCVE-2025-37727Elasticsearch Insertion of sensitive information in log fileModerate
MarinerCVE-2025-11412GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-boundsModerate
MarinerCVE-2025-39931crypto: af_alg - Set merge to zero early in af_alg_sendmsgModerate
MarinerCVE-2025-39933smb: client: let recv_done verify data_offset, data_length and remaining_data_lengthModerate
MarinerCVE-2025-39947net/mlx5e: Harden uplink netdev access against device unbindModerate
MarinerCVE-2025-61985ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.Low
MarinerCVE-2025-10728Uncontrolled recursion in Qt SVG moduleImportant
MarinerCVE-2025-39916mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()Moderate
MarinerCVE-2025-39902mm/slub: avoid accessing metadata when pointer is invalid in object_err()Moderate
MarinerCVE-2025-39923dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/eesModerate
MarinerCVE-2025-39898e1000e: fix heap overflow in e1000_set_eepromCritical
MarinerCVE-2025-39925can: j1939: implement NETDEV_UNREGISTER notification handlerCritical
MarinerCVE-2025-39891wifi: mwifiex: Initialize the chan_stats array to zeroModerate
MarinerCVE-2025-39927ceph: fix race condition validating r_parent before applying stateModerate
MarinerCVE-2025-39901i40e: remove read access to debugfs filesImportant
MarinerCVE-2025-39910mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()Critical
MarinerCVE-2025-39909mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()Moderate
Microsoft Brokering File SystemCVE-2025-48004Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Brokering File SystemCVE-2025-59189Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Configuration ManagerCVE-2025-55320Configuration Manager Elevation of Privilege VulnerabilityImportant
Microsoft Configuration ManagerCVE-2025-59213Configuration Manager Elevation of Privilege VulnerabilityImportant
Microsoft Defender for LinuxCVE-2025-59497Microsoft Defender for Linux Denial of Service VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2025-11213Chromium: CVE-2025-11213 Inappropriate implementation in OmniboxUnknown
Microsoft Edge (Chromium-based)CVE-2025-11210Chromium: CVE-2025-11210 Side-channel information leakage in TabUnknown
Microsoft Edge (Chromium-based)CVE-2025-11460Chromium: CVE-2025-11460 Use after free in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11458Chromium: CVE-2025-11458 Heap buffer overflow in SyncUnknown
Microsoft Edge (Chromium-based)CVE-2025-11215Chromium: CVE-2025-11215 Off by one error in V8Unknown
Microsoft Edge (Chromium-based)CVE-2025-11216Chromium: CVE-2025-11216 Inappropriate implementation in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11208Chromium: CVE-2025-11208 Inappropriate implementation in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11212Chromium: CVE-2025-11212 Inappropriate implementation in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11211Chromium: CVE-2025-11211 Out of bounds read in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11205Chromium: CVE-2025-11205 Heap buffer overflow in WebGPUUnknown
Microsoft Edge (Chromium-based)CVE-2025-11207Chromium: CVE-2025-11207 Side-channel information leakage in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11209Chromium: CVE-2025-11209 Inappropriate implementation in OmniboxUnknown
Microsoft Edge (Chromium-based)CVE-2025-11206Chromium: CVE-2025-11206 Heap buffer overflow in VideoUnknown
Microsoft Edge (Chromium-based)CVE-2025-11219Chromium: CVE-2025-11219 Use after free in V8Unknown
Microsoft Exchange ServerCVE-2025-59248Microsoft Exchange Server Spoofing VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-59249Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-53782Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Failover Cluster Virtual DriverCVE-2025-59260Microsoft Failover Cluster Virtual Driver Information Disclosure VulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-59195Microsoft Graphics Component Denial of Service VulnerabilityImportant
Microsoft Graphics ComponentCVE-2016-9535MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow VulnerabilityCritical
Microsoft Graphics ComponentCVE-2025-59261Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-49708Microsoft Graphics Component Elevation of Privilege VulnerabilityCritical
Microsoft Graphics ComponentCVE-2025-59205Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft OfficeCVE-2025-59229Microsoft Office Denial of Service VulnerabilityImportant
Microsoft OfficeCVE-2025-59227Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-59234Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft Office ExcelCVE-2025-59223Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59224Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59225Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59232Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59235Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59233Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59231Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59236Microsoft Excel Remote Code Execution VulnerabilityCritical
Microsoft Office ExcelCVE-2025-59243Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office PowerPointCVE-2025-59238Microsoft PowerPoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-59237Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-59228Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office VisioCVE-2025-59226Microsoft Office Visio Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-59222Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-59221Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft PowerShellCVE-2025-25004PowerShell Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2025-55701Windows Authentication Elevation of Privilege VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2025-54957MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoderImportant
Microsoft Windows Search ComponentCVE-2025-59198Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows Search ComponentCVE-2025-59190Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows Search ComponentCVE-2025-59253Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows SpeechCVE-2025-58715Windows Speech Runtime Elevation of Privilege VulnerabilityImportant
Microsoft Windows SpeechCVE-2025-58716Windows Speech Runtime Elevation of Privilege VulnerabilityImportant
Network Connection Status Indicator (NCSI)CVE-2025-59201Network Connection Status Indicator (NCSI) Elevation of Privilege VulnerabilityImportant
NtQueryInformation Token function (ntifs.h)CVE-2025-55696NtQueryInformation Token function (ntifs.h) Elevation of Privilege VulnerabilityImportant
Redis EnterpriseCVE-2025-59271Redis Enterprise Elevation of Privilege VulnerabilityCritical
Remote Desktop ClientCVE-2025-58718Remote Desktop Client Remote Code Execution VulnerabilityImportant
Software Protection Platform (SPP)CVE-2025-59199Software Protection Platform (SPP) Elevation of Privilege VulnerabilityImportant
Storport.sys DriverCVE-2025-59192Storport.sys Driver Elevation of Privilege VulnerabilityImportant
TCG TPM2.0CVE-2025-2884Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementationImportant
Virtual Secure ModeCVE-2025-48813Virtual Secure Mode Spoofing VulnerabilityImportant
Visual StudioCVE-2025-55240Visual Studio Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-54132GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram ToolImportant
Windows Ancillary Function Driver for WinSockCVE-2025-58714Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-59242Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59277Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59278Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59275Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows BitLockerCVE-2025-55337Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55332Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55333Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55330Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55338Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55682Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-59290Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-58728Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-59289Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-55680Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-55336Windows Cloud Files Mini Filter Driver Information Disclosure VulnerabilityImportant
Windows COMCVE-2025-58725Windows COM+ Event System Service Elevation of Privilege VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2025-58727Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Windows Core ShellCVE-2025-59185NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Core ShellCVE-2025-59244NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Cryptographic ServicesCVE-2025-58720Windows Cryptographic Services Information Disclosure VulnerabilityImportant
Windows Device Association Broker serviceCVE-2025-50174Windows Device Association Broker Service Elevation of Privilege VulnerabilityImportant
Windows Device Association Broker serviceCVE-2025-55677Windows Device Association Broker Service Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-53150Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-50175Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows DirectXCVE-2025-55678DirectX Graphics Kernel Elevation of Privilege VulnerabilityImportant
Windows DirectXCVE-2025-55698DirectX Graphics Kernel Denial of Service VulnerabilityImportant
Windows DWMCVE-2025-58722Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWMCVE-2025-55681Desktop Windows Manager Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-59255Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-59254Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows Error ReportingCVE-2025-55692Windows Error Reporting Service Elevation of Privilege VulnerabilityImportant
Windows Error ReportingCVE-2025-55694Windows Error Reporting Service Elevation of Privilege VulnerabilityImportant
Windows ETL ChannelCVE-2025-59197Windows ETL Channel Information Disclosure VulnerabilityImportant
Windows Failover ClusterCVE-2025-59188Microsoft Failover Cluster Information Disclosure VulnerabilityImportant
Windows Failover ClusterCVE-2025-47979Microsoft Failover Cluster Information Disclosure VulnerabilityImportant
Windows File ExplorerCVE-2025-59214Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows File ExplorerCVE-2025-58739Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows Health and Optimized Experiences ServiceCVE-2025-59241Windows Health and Optimized Experiences Elevation of Privilege VulnerabilityImportant
Windows HelloCVE-2025-53139Windows Hello Security Feature Bypass VulnerabilityImportant
Windows High Availability ServicesCVE-2025-59184Storage Spaces Direct Information Disclosure VulnerabilityImportant
Windows Hyper-VCVE-2025-55328Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55679Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-55683Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-59207Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55334Windows Kernel Security Feature Bypass VulnerabilityImportant
Windows KernelCVE-2025-59186Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-55693Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-59194Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-59187Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-50152Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55699Windows Kernel Information Disclosure VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-58729Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-59257Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-59259Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Management ServicesCVE-2025-59193Windows Management Services Elevation of Privilege VulnerabilityImportant
Windows Management ServicesCVE-2025-59204Windows Management Services Information Disclosure VulnerabilityImportant
Windows MapUrlToZoneCVE-2025-59208Windows MapUrlToZone Information Disclosure VulnerabilityImportant
Windows NDISCVE-2025-55339Windows Network Driver Interface Specification Driver Elevation of Privilege VulnerabilityImportant
Windows NTFSCVE-2025-55335Windows NTFS Elevation of Privilege VulnerabilityImportant
Windows NTLMCVE-2025-59284Windows NTLM Spoofing VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55331Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55689Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55685Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55686Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55690Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55684Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55688Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55691Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows Push Notification CoreCVE-2025-59209Windows Push Notification Information Disclosure VulnerabilityImportant
Windows Push Notification CoreCVE-2025-59211Windows Push Notification Information Disclosure VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2025-59230Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote DesktopCVE-2025-58737Remote Desktop Protocol Remote Code Execution VulnerabilityImportant
Windows Remote Desktop ProtocolCVE-2025-55340Windows Remote Desktop Protocol Security Feature BypassImportant
Windows Remote Desktop ServicesCVE-2025-59202Windows Remote Desktop Services Elevation of Privilege VulnerabilityImportant
Windows Remote Procedure CallCVE-2025-59502Remote Procedure Call Denial of Service VulnerabilityModerate
Windows Resilient File System (ReFS)CVE-2025-55687Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityImportant
Windows Resilient File System (ReFS) Deduplication ServiceCVE-2025-59210Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege VulnerabilityImportant
Windows Resilient File System (ReFS) Deduplication ServiceCVE-2025-59206Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-58717Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-55700Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Secure BootCVE-2025-47827MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11Important
Windows Server Update ServiceCVE-2025-59287Windows Server Update Service (WSUS) Remote Code Execution VulnerabilityCritical
Windows SMB ClientCVE-2025-59280Windows SMB Client Tampering VulnerabilityImportant
Windows SMB ServerCVE-2025-58726Windows SMB Server Elevation of Privilege VulnerabilityImportant
Windows SSDP ServiceCVE-2025-59196Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege VulnerabilityImportant
Windows StateRepository APICVE-2025-59203Windows State Repository API Server File Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-55325Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Taskbar LiveCVE-2025-59294Windows Taskbar Live Preview Information Disclosure VulnerabilityImportant
Windows USB Video DriverCVE-2025-55676Windows USB Video Class System Driver Information Disclosure VulnerabilityImportant
Windows Virtualization-Based Security (VBS) EnclaveCVE-2025-53717Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityImportant
Windows WLAN Auto Config ServiceCVE-2025-55695Windows WLAN AutoConfig Service Information Disclosure VulnerabilityImportant
XboxCVE-2025-53768Xbox IStorageService Elevation of Privilege VulnerabilityImportant
XBox Gaming ServicesCVE-2025-59281Xbox Gaming Services Elevation of Privilege VulnerabilityImportant
Microsoft October 2025 patch tuesday fixes 172 flaws including Zero-Days and actively exploited flaws