Patch Tuesday - October 2025

Oct 14 2025

Microsoft is publishing 172 new vulnerabilities today. Microsoft is aware of public disclosure for just two of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Today sees six zero-day vulnerabilities patched, but only a single one is evaluated as critical severity. Microsoft is aware of public disclosure in three cases, and exploitation in the wild in the remaining three. Today’s release includes the publication of five further critical remote code execution (RCE) vulnerabilities, although Microsoft expects that only one is likely to see exploitation. 14 browser vulnerabilities and a significant array of fixes for Azure Linux (aka Mariner) have already been published separately this month, and are not included in the total. Alongside older versions of Exchange and Office, the behemoth that is Windows 10 receives its final security patches today, although there are some exceptions.

TPM 2.0: zero-day information disclosure

When the Trusted Computing Group (TCG) consortium’s TPM 2.0 reference implementation contains a flaw, under normal circumstances that flaw is likely to be replicated in the downstream implementation by each manufacturer. That is the case with CVE-2025-2884, an information disclosure vulnerability which Microsoft is treating as a zero day despite the curious circumstance that Microsoft is a founder member of TCG, and thus presumably privy to the discovery before its publication. Windows 11 and newer versions of Windows Server receive patches. In place of patches, admins for older Windows products such as Windows 10 and Server 2019 receive another implicit reminder that Microsoft would strongly prefer that everyone upgrade.

Remote Access Connection Manager: zero-day EoP

Local elevation of privilege (EoP) is always attractive to an attacker, since even if it doesn’t get them where they need to be, it can provide an important link in the chain. Microsoft is already aware of exploitation in the wild for CVE-2025-59230, a vulnerability in the Windows Remote Access Connection Manager. With no user interaction required, this will go straight into an attacker’s standard toolkit. There’s very little information in the advisory itself, but someone out there knows exactly how to exploit this vulnerability. Credit where credit is due: Microsoft detected the exploitation, and now we have patches for all supported versions of Windows.

Agere fax modem driver: pair of zero-day EoP

Are you a doctor, a lawyer, or a hipster? If so, you might be one of the holdouts who still feels the need to connect a fax machine to a computer, and you should brace yourself for some bad news, then some good news, and then some more bad news. For starters, Microsoft has published two zero-day vulnerabilities in the Agere Modem driver: CVE-2025-24052, which is publicly disclosed, and CVE-2025-24990, which has already been exploited in the wild. The vulnerable driver ships with every version of Windows, up to and including Server 2025. Maybe your fax modem uses a different chipset, and so you don’t need the Agere driver? Perhaps you’ve simply discovered email? Tough luck. Your PC is still vulnerable, and a local attacker with a minimally privileged account can elevate to administrator. The good news is that Microsoft is patching both of these vulnerabilities today. The sting in the tail is that they’re fixing the glitch by removing the vulnerable driver altogether, so if you are still using a fax modem with an Agere chipset, no fax for you!

IGEL OS: UEFI zero-day

If you don’t run thin clients targeting Windows environments, you might be unaware of the existence of IGEL OS, but today’s publication of the advisory for CVE-2025-47827 — which is a zero-day vulnerability — may put it on the radar a little more widely. Successful exploitation abuses overly lax cryptographic verification of root filesystem, and allows bypass of Secure Boot. Microsoft is aware of exploitation in the wild, and is offering patches for the usual array of Windows products.

The advisory doesn’t explain what the Windows patches are protecting against when the flaw is in IGEL OS itself. However, the write-up by the original discoverer contains a significant amount of interesting backstory, and we can infer that the Windows patches will include additions to the UEFI revocation list, theoretically rendering a specific asset immune to this attack.

AMD: zero-day information disclosure

Every so often, a processor vulnerability gets some attention. When they are included in a set of Patch Tuesday vulns, processor vulnerabilities tend to march to the beat of their own drummer, since Microsoft likely has very little control over how or when these are announced. AMD published CVE-2025-0033 yesterday, and Microsoft has responded with their own advisory today. The flaw affects only fairly recent AMD EPYC processors, which are more likely to be found in a cloud data centre than they are in a metal box underneath your desk.

This is technically a zero-day vulnerability, since Microsoft is acknowledging that at least some products are affected, and there’s no patch yet. Specifically, Microsoft acknowledges that patches are needed for several variants of Azure Confidential Compute VM, and that they are working towards providing those patches. There isn’t anything much to do here yet from a Windows administration perspective, since AMD’s advisory understandably addresses only the underlying hardware, and Microsoft hasn’t said anything yet about any possible impact on Windows itself.

Windows Server Update Service: critical pre-auth RCE

The Windows Server Update Service (WSUS) provides admins with some very handy features. You can download updates from Microsoft once, and then redistribute them locally. It also allows scheduling of deployments to minimize impact on business activities, as well as centralized monitoring of updates. What’s not to love, right? Answer: CVE-2025-59287, a critical RCE which allows an attacker to execute code remotely. Although Microsoft isn’t currently claiming knowledge of disclosure or exploitation in the wild, they do consider exploitation more likely. Although the advisory doesn’t explicitly mark this one out as a pre-authentication RCE, the CVSS v3 base score of 9.8 tells an alarming story: a network attack vector, no privileges required, and low attack complexity. Patches are available for all versions of Windows Server. Taking all that into account, along with the Acknowledgements section of the advisory, a good time to apply these patches is right meow.

Microsoft lifecycle update

Today marks the end of an era, sort of. As Rapid7 has previously noted, today marks the end of support for non-LTSC versions of Windows 10. Of course, there’s a lot of nuance here. First, let’s address Windows 10 Long Term Support Channel (LTSC) installations, which are Microsoft’s way of providing risk-averse enterprise customers with the same exact OS almost indefinitely. An LTSC installation never has to worry about huge feature updates, but instead receives only security patches.

All versions of Windows 10 LTSC will continue to receive security updates for quite some time, with the exception of Windows 10 Enterprise LTSC 2015, which is now too old even for Microsoft to support. Still, that’s been an extra eight-and-a-half years of security updates vs. the equivalent non-LTSC version of Windows 10. When you’re relying on Windows 10 for the safe operation of an MRI scanner or a critical industrial control system at a steel plant, stability is key. A frank discussion of whether or not Windows is the optimal choice in these scenarios is beyond the scope of this analysis. Regular LTSC runs until 2027, whereas IoT Enterprise LTSC 2021 is scheduled to limp onwards all the way until January 2032.

It’s likely that Microsoft’s Extended Security Update (ESU) offering will be much more widely discussed in the coming weeks than is typical. Via the ESU program, Microsoft offers further security updates for software which has moved past the end of support. It is generally a paid “cash for updates” service, although consumers in the European Union can take advantage of Microsoft’s offer of one free year of ESU for Windows 10 Home or Professional. It may well be a coincidence that Microsoft has extended this generous offer only to consumers in a large jurisdiction with strong consumer rights. Users without spare cash or an EU home address can consider syncing their PC settings to OneDrive — make sure to enable multi-factor authentication on your Microsoft account if you do this — or spending 1000 Microsoft Rewards points, if you know what those are and have some to spare.

Microsoft, of course, has been pushing us all to upgrade to Windows 11 for a long time, but this leaves some people out in the cold. Windows 10 users without the cash to upgrade to Windows 11-compatible PC hardware or the IT situational awareness to realize that they are now at increased risk of compromise will now drift further and further away from a solid security stance. Not for the first time, the most vulnerable users with the fewest resources will end up in the most precarious situation.

Also receiving their final guaranteed patches today: Office 2016 and Office 2019. Another significant change: both Exchange 2016 and Exchange 2019 are now entirely replaced by Exchange Server Subscription Edition. A huge amount of lifecycle change today, and one which Microsoft has been building towards for many years now. The full impact may not become clear for a while, especially the retirement of Windows 10.

Summary charts

A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Oct

A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Oct

A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Oct

Summary tables

Apps vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59489

MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability

No

No

8.4

CVE-2025-59281

Xbox Gaming Services Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59252

M365 Copilot Spoofing Vulnerability

No

No

6.5

CVE-2025-59272

Copilot Spoofing Vulnerability

No

No

6.5

CVE-2025-59286

Copilot Spoofing Vulnerability

No

No

6.5

Azure vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59246

Azure Entra ID Elevation of Privilege Vulnerability

No

No

9.8

CVE-2025-59218

Azure Entra ID Elevation of Privilege Vulnerability

No

No

9.6

CVE-2025-59247

Azure PlayFab Elevation of Privilege Vulnerability

No

No

8.8

CVE-2025-59271

Redis Enterprise Elevation of Privilege Vulnerability

No

No

8.7

CVE-2025-55321

Azure Monitor Log Analytics Spoofing Vulnerability

No

No

8.7

CVE-2025-59291

Confidential Azure Container Instances Elevation of Privilege Vulnerability

No

No

8.2

CVE-2025-59292

Azure Compute Gallery Elevation of Privilege Vulnerability

No

No

8.2

CVE-2025-0033

AMD CVE-2025-0033: RMP Corruption During SNP Initialization

No

Yes

8.2

CVE-2025-59494

Azure Monitor Agent Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-58724

Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59285

Azure Monitor Agent Elevation of Privilege Vulnerability

No

No

7

CVE-2025-47989

Azure Connected Machine Agent Elevation of Privilege Vulnerability

No

No

7

Browser vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-11460

Chromium: CVE-2025-11460 Use after free in Storage

No

No

N/A

CVE-2025-11458

Chromium: CVE-2025-11458 Heap buffer overflow in Sync

No

No

N/A

CVE-2025-11219

Chromium: CVE-2025-11219 Use after free in V8

No

No

N/A

CVE-2025-11216

Chromium: CVE-2025-11216 Inappropriate implementation in Storage

No

No

N/A

CVE-2025-11215

Chromium: CVE-2025-11215 Off by one error in V8

No

No

N/A

CVE-2025-11213

Chromium: CVE-2025-11213 Inappropriate implementation in Omnibox

No

No

N/A

CVE-2025-11212

Chromium: CVE-2025-11212 Inappropriate implementation in Media

No

No

N/A

CVE-2025-11211

Chromium: CVE-2025-11211 Out of bounds read in Media

No

No

N/A

CVE-2025-11210

Chromium: CVE-2025-11210 Side-channel information leakage in Tab

No

No

N/A

CVE-2025-11209

Chromium: CVE-2025-11209 Inappropriate implementation in Omnibox

No

No

N/A

CVE-2025-11208

Chromium: CVE-2025-11208 Inappropriate implementation in Media

No

No

N/A

CVE-2025-11207

Chromium: CVE-2025-11207 Side-channel information leakage in Storage

No

No

N/A

CVE-2025-11206

Chromium: CVE-2025-11206 Heap buffer overflow in Video

No

No

N/A

CVE-2025-11205

Chromium: CVE-2025-11205 Heap buffer overflow in WebGPU

No

No

N/A

Developer Tools vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-55315

ASP.NET Security Feature Bypass Vulnerability

No

No

9.9

CVE-2025-55240

Visual Studio Elevation of Privilege Vulnerability

No

No

7.3

CVE-2025-55247

.NET Elevation of Privilege Vulnerability

No

No

7.3

CVE-2025-55248

.NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability

No

No

4.8

CVE-2025-54132

GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool

No

No

4.4

Developer Tools ESU Windows vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-25004

PowerShell Elevation of Privilege Vulnerability

No

No

7.3

ESU Windows vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59287

Windows Server Update Service (WSUS) Remote Code Execution Vulnerability

No

No

9.8

CVE-2025-59295

Windows URL Parsing Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-58718

Remote Desktop Client Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-59230

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

Yes

No

7.8

CVE-2025-59187

Windows Kernel Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55692

Windows Error Reporting Service Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55701

Windows Authentication Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59277

Windows Authentication Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59275

Windows Authentication Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59278

Windows Authentication Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59242

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-58714

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-24052

Windows Agere Modem Driver Elevation of Privilege Vulnerability

No

Yes

7.8

CVE-2025-24990

Windows Agere Modem Driver Elevation of Privilege Vulnerability

Yes

No

7.8

CVE-2025-59201

Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-58726

Windows SMB Server Elevation of Privilege Vulnerability

No

No

7.5

CVE-2025-55687

Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

No

No

7.4

CVE-2025-55335

Windows NTFS Elevation of Privilege Vulnerability

No

No

7.4

CVE-2025-59208

Windows MapUrlToZone Information Disclosure Vulnerability

No

No

7.1

CVE-2025-59196

Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59202

Windows Remote Desktop Services Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59205

Windows Graphics Component Elevation of Privilege Vulnerability

No

No

7

CVE-2025-58725

Windows COM+ Event System Service Elevation of Privilege Vulnerability

No

No

7

CVE-2025-58737

Remote Desktop Protocol Remote Code Execution Vulnerability

No

No

7

CVE-2025-59282

Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-58732

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-58735

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-58730

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-58733

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-58736

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-55678

DirectX Graphics Kernel Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55700

Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

No

No

6.5

CVE-2025-58717

Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

No

No

6.5

CVE-2025-59259

Windows Local Session Manager (LSM) Denial of Service Vulnerability

No

No

6.5

CVE-2025-58729

Windows Local Session Manager (LSM) Denial of Service Vulnerability

No

No

6.5

CVE-2025-59185

NTLM Hash Disclosure Spoofing Vulnerability

No

No

6.5

CVE-2025-59244

NTLM Hash Disclosure Spoofing Vulnerability

No

No

6.5

CVE-2025-58739

Microsoft Windows File Explorer Spoofing Vulnerability

No

No

6.5

CVE-2025-59214

Microsoft Windows File Explorer Spoofing Vulnerability

No

No

6.5

CVE-2025-59258

Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability

No

No

6.2

CVE-2025-55695

Windows WLAN AutoConfig Service Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59190

Windows Search Service Denial of Service Vulnerability

No

No

5.5

CVE-2025-59253

Windows Search Service Denial of Service Vulnerability

No

No

5.5

CVE-2025-59211

Windows Push Notification Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59209

Windows Push Notification Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59188

Microsoft Failover Cluster Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59198

Windows Search Service Denial of Service Vulnerability

No

No

5

CVE-2025-47827

MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11

Yes

No

4.6

CVE-2016-9535

MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability

No

No

4

CVE-2025-59280

Windows SMB Client Tampering Vulnerability

No

No

3.1

Mariner Open Source Software vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-49844

Redis Lua Use-After-Free may lead to remote code execution

No

No

9.9

CVE-2025-10729

Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG

No

No

9.3

CVE-2025-11234

Qemu-kvm: vnc websocket handshake use-after-free

No

No

7.5

CVE-2025-46817

Lua library commands may lead to integer overflow and potential RCE

No

No

7

CVE-2025-46819

Redis is vulnerable to DoS via specially crafted LUA scripts

No

No

6.3

CVE-2025-46818

Redis: Authenticated users can execute LUA scripts as a different user

No

No

6

CVE-2025-61985

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

No

No

4.5

CVE-2025-8291

ZIP64 End of Central Directory (EOCD) Locator record offset not checked

No

No

4.3

CVE-2025-61984

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

No

No

3.6

CVE-2025-11414

GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds

No

No

3.3

CVE-2025-11413

GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds

No

No

3.3

CVE-2025-11412

GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds

No

No

3.3

CVE-2025-11495

GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow

No

No

3.3

CVE-2025-10728

Uncontrolled recursion in Qt SVG module

No

No

N/A

Microsoft Office vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59228

Microsoft SharePoint Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-59237

Microsoft SharePoint Remote Code Execution Vulnerability

No

No

8.8

CVE-2025-59236

Microsoft Excel Remote Code Execution Vulnerability

No

No

8.4

CVE-2025-59222

Microsoft Word Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59238

Microsoft PowerPoint Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59226

Microsoft Office Visio Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59234

Microsoft Office Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59227

Microsoft Office Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59231

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59233

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59243

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59223

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59224

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59225

Microsoft Excel Remote Code Execution Vulnerability

No

No

7.8

CVE-2025-59235

Microsoft Excel Information Disclosure Vulnerability

No

No

7.1

CVE-2025-59232

Microsoft Excel Information Disclosure Vulnerability

No

No

7.1

CVE-2025-59221

Microsoft Word Remote Code Execution Vulnerability

No

No

7

CVE-2025-59229

Microsoft Office Denial of Service Vulnerability

No

No

5.5

Open Source Software vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-39907

mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer

No

No

9.8

CVE-2025-39910

mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()

No

No

9.8

CVE-2025-39943

ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer

No

No

9.8

CVE-2025-39898

e1000e: fix heap overflow in e1000_set_eeprom

No

No

9.8

CVE-2025-39925

can: j1939: implement NETDEV_UNREGISTER notification handler

No

No

9.8

CVE-2025-39952

wifi: wilc1000: avoid buffer overflow in WID string configuration

No

No

7.8

CVE-2025-39944

octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()

No

No

7.8

CVE-2025-39945

cnic: Fix use-after-free bugs in cnic_delete_task

No

No

7.8

CVE-2025-39955

tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().

No

No

7.1

CVE-2025-39905

net: phylink: add lock for serializing concurrent pl->phydev writes with resolver

No

No

7.1

CVE-2025-39901

i40e: remove read access to debugfs files

No

No

7.1

CVE-2023-53469

af_unix: Fix null-ptr-deref in unix_stream_sendpage().

No

No

7.1

CVE-2025-39913

tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.

No

No

6.6

CVE-2025-39951

um: virtio_uml: Fix use-after-free after put_device in probe

No

No

6.1

CVE-2025-39940

dm-stripe: fix a possible integer overflow

No

No

6.1

CVE-2025-39961

iommu/amd/pgtbl: Fix possible race while increase page table level

No

No

5.8

CVE-2025-37727

Elasticsearch Insertion of sensitive information in log file

No

No

5.7

CVE-2025-39891

wifi: mwifiex: Initialize the chan_stats array to zero

No

No

5.5

CVE-2025-39914

tracing: Silence warning when chunk allocation fails in trace_pid_write

No

No

5.5

CVE-2025-39946

tls: make sure to abort the stream if headers are bogus

No

No

5.5

CVE-2025-39932

smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)

No

No

5.5

CVE-2025-39933

smb: client: let recv_done verify data_offset, data_length and remaining_data_length

No

No

5.5

CVE-2025-39929

smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path

No

No

5.5

CVE-2025-39895

sched: Fix sched_numa_find_nth_cpu() if mask offline

No

No

5.5

CVE-2025-39949

qed: Don't collect too many protection override GRC elements

No

No

5.5

CVE-2025-39920

pcmcia: Add error handling for add_interval() in do_validate_mem()

No

No

5.5

CVE-2025-39937

net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer

No

No

5.5

CVE-2025-39947

net/mlx5e: Harden uplink netdev access against device unbind

No

No

5.5

CVE-2022-50502

mm: /proc/pid/smaps_rollup: fix no vma's null-deref

No

No

5.5

CVE-2025-39902

mm/slub: avoid accessing metadata when pointer is invalid in object_err()

No

No

5.5

CVE-2025-39916

mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()

No

No

5.5

CVE-2025-39909

mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()

No

No

5.5

CVE-2025-39942

ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size

No

No

5.5

CVE-2025-39934

drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ

No

No

5.5

CVE-2025-39923

dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees

No

No

5.5

CVE-2025-39931

crypto: af_alg - Set merge to zero early in af_alg_sendmsg

No

No

5.5

CVE-2025-39953

cgroup: split cgroup_destroy_wq into 3 workqueues

No

No

5.5

CVE-2025-39938

ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed

No

No

5.5

CVE-2025-59288

Playwright Spoofing Vulnerability

No

No

5.3

CVE-2025-39927

ceph: fix race condition validating r_parent before applying state

No

No

4.7

CVE-2025-39957

wifi: mac80211: increase scan_ies_len for S1G

No

No

4

CVE-2025-39958

iommu/s390: Make attach succeed when the device was surprise removed

No

No

4

CVE-2025-39911

i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path

No

No

3.3

SQL Server vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59250

JDBC Driver for SQL Server Spoofing Vulnerability

No

No

8.1

Server Software vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59249

Microsoft Exchange Server Elevation of Privilege Vulnerability

No

No

8.8

CVE-2025-53782

Microsoft Exchange Server Elevation of Privilege Vulnerability

No

No

8.4

CVE-2025-59248

Microsoft Exchange Server Spoofing Vulnerability

No

No

7.5

System Center vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-59213

Configuration Manager Elevation of Privilege Vulnerability

No

No

8.4

CVE-2025-59497

Microsoft Defender for Linux Denial of Service Vulnerability

No

No

7

CVE-2025-55320

Configuration Manager Elevation of Privilege Vulnerability

No

No

6.7

Windows vulnerabilities

CVE

Title

Exploited?

Publicly disclosed?

CVSSv3 base score

CVE-2025-49708

Microsoft Graphics Component Elevation of Privilege Vulnerability

No

No

9.9

CVE-2025-58715

Windows Speech Runtime Elevation of Privilege Vulnerability

No

No

8.8

CVE-2025-58716

Windows Speech Runtime Elevation of Privilege Vulnerability

No

No

8.8

CVE-2025-53768

Xbox IStorageService Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55339

Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59207

Windows Kernel Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-50152

Windows Kernel Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55328

Windows Hyper-V Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59241

Windows Health and Optimized Experiences Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55694

Windows Error Reporting Service Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-53150

Windows Digital Media Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-50175

Windows Digital Media Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55677

Windows Device Association Broker Service Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59255

Windows DWM Core Library Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-58720

Windows Cryptographic Services Information Disclosure Vulnerability

No

No

7.8

CVE-2025-59191

Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55680

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-58728

Windows Bluetooth Service Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59290

Windows Bluetooth Service Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59192

Storport.sys Driver Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59199

Software Protection Platform (SPP) Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55696

NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-58722

Microsoft DWM Core Library Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-59254

Microsoft DWM Core Library Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-55697

Azure Local Elevation of Privilege Vulnerability

No

No

7.8

CVE-2025-53139

Windows Hello Security Feature Bypass Vulnerability

No

No

7.7

CVE-2025-55698

DirectX Graphics Kernel Denial of Service Vulnerability

No

No

7.7

CVE-2025-59200

Data Sharing Service Spoofing Vulnerability

No

No

7.7

CVE-2025-55326

Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability

No

No

7.5

CVE-2025-59502

Remote Procedure Call Denial of Service Vulnerability

No

No

7.5

CVE-2025-59206

Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability

No

No

7.4

CVE-2025-59210

Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability

No

No

7.4

CVE-2025-55693

Windows Kernel Elevation of Privilege Vulnerability

No

No

7.4

CVE-2025-48004

Microsoft Brokering File System Elevation of Privilege Vulnerability

No

No

7.4

CVE-2025-59189

Microsoft Brokering File System Elevation of Privilege Vulnerability

No

No

7.4

CVE-2025-53717

Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55340

Windows Remote Desktop Protocol Security Feature Bypass

No

No

7

CVE-2025-55685

Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55686

Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55689

Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55331

Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55684

Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55688

Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55690

Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

No

No

7

CVE-2025-55691

Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59193

Windows Management Services Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59194

Windows Kernel Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59261

Windows Graphics Component Elevation of Privilege Vulnerability

No

No

7

CVE-2025-50174

Windows Device Association Broker Service Elevation of Privilege Vulnerability

No

No

7

CVE-2025-58727

Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59289

Windows Bluetooth Service Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59195

Microsoft Graphics Component Denial of Service Vulnerability

No

No

7

CVE-2025-54957

MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder

No

No

7

CVE-2025-58731

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-58734

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-58738

Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

No

No

7

CVE-2025-55681

Desktop Windows Manager Elevation of Privilege Vulnerability

No

No

7

CVE-2025-59257

Windows Local Session Manager (LSM) Denial of Service Vulnerability

No

No

6.5

CVE-2025-48813

Virtual Secure Mode Spoofing Vulnerability

No

No

6.3

CVE-2025-55334

Windows Kernel Security Feature Bypass Vulnerability

No

No

6.2

CVE-2025-55333

Windows BitLocker Security Feature Bypass Vulnerability

No

No

6.1

CVE-2025-55338

Windows BitLocker Security Feature Bypass Vulnerability

No

No

6.1

CVE-2025-55330

Windows BitLocker Security Feature Bypass Vulnerability

No

No

6.1

CVE-2025-55332

Windows BitLocker Security Feature Bypass Vulnerability

No

No

6.1

CVE-2025-55337

Windows BitLocker Security Feature Bypass Vulnerability

No

No

6.1

CVE-2025-55682

Windows BitLocker Security Feature Bypass Vulnerability

No

No

6.1

CVE-2025-55676

Windows USB Video Class System Driver Information Disclosure Vulnerability

No

No

5.5

CVE-2025-55325

Windows Storage Management Provider Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59203

Windows State Repository API Server File Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59204

Windows Management Services Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59186

Windows Kernel Information Disclosure Vulnerability

No

No

5.5

CVE-2025-55683

Windows Kernel Information Disclosure Vulnerability

No

No

5.5

CVE-2025-55699

Windows Kernel Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59197

Windows ETL Channel Information Disclosure Vulnerability

No

No

5.5

CVE-2025-55336

Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59184

Storage Spaces Direct Information Disclosure Vulnerability

No

No

5.5

CVE-2025-59260

Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability

No

No

5.5

CVE-2025-47979

Microsoft Failover Cluster Information Disclosure Vulnerability

No

No

5.5

CVE-2025-2884

Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation

No

Yes

5.3

CVE-2025-55679

Windows Kernel Information Disclosure Vulnerability

No

No

5.1

CVE-2025-58719

Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

No

No

4.7

CVE-2025-59284

Windows NTLM Spoofing Vulnerability

No

No

3.3

CVE-2025-59294

Windows Taskbar Live Preview Information Disclosure Vulnerability

No

No

2.1

Update history

  • 2025-10-20: added Summary Tables.

Read more