Microsoft Patch Tuesday October 2025: 4 Zero-Days and 172 Vulnerabilities Fixed

Microsoft has released its October 2025 Patch Tuesday update, addressing a massive 172 security vulnerabilities across its product ecosystem.

The security bulletin is highlighted by fixes for four zero-day flaws, two of which are confirmed to be actively exploited in the wild.

The patches primarily tackle a significant number of elevation of privilege and remote code execution vulnerabilities, underscoring the urgent need for organizations to apply these updates promptly to defend against emerging cyber threats.

Zero-Day Exploits and Critical Execution Bugs

The most immediate threats in this month’s release are the two zero-day vulnerabilities being actively used by attackers.

One of these, tracked as CVE-2025-59230, is a privilege escalation flaw in the Windows Remote Access Connection Manager that allows local attackers to gain elevated system rights.

In addition to the zero-days, Microsoft patched several critical remote code execution (RCE) vulnerabilities.

Among them are CVE-2025-59234 and CVE-2025-59236, use-after-free bugs in Microsoft Office and Excel that could grant attackers full system control if a user opens a specially crafted malicious file.

Another critical RCE, CVE-2025-59287, affects the Windows Server Update Service (WSUS) and could be leveraged in supply-chain attacks.

Pervasive Privilege Escalation Flaws

Elevation of privilege vulnerabilities represent the largest category in this update, with 80 distinct flaws being fixed. These bugs allow attackers who have already gained initial access to a system to escalate their permissions, often to the administrator level.

Notable examples include CVE-2025-49708 in the Microsoft Graphics Component, which can be exploited over a network, and a series of bugs in the Windows PrintWorkflowUserSvc (CVE-2025-55684 through 55691) that expose a common vector in enterprise environments.

Cloud infrastructure is also affected, with critical privilege escalation flaws like CVE-2025-59291 and CVE-2025-59292 patched in Azure Container Instances and Compute Gallery.

Diverse Vulnerabilities Across the Ecosystem

The October update addresses a wide spectrum of security issues beyond RCE and privilege escalation. The patches cover 28 information disclosure flaws, 11 security feature bypasses, and 10 spoofing vulnerabilities.

Key fixes include a Secure Boot bypass (CVE-2025-47827) and a publicly disclosed information leak in TPM 2.0 modules (CVE-2025-2884). Microsoft also addressed spoofing risks in File Explorer and Exchange Server, a security feature bypass in BitLocker (CVE-2025-55682) that can be exploited with physical access, and denial-of-service flaws in components like DirectX.

The sheer breadth of affected products, from the Windows Kernel to Azure services, reinforces the importance of comprehensive and timely patch management.

CVE IDVulnerability DetailsTypeSeverity
CVE-2016-9535tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka “Predictor heap-buffer-overflow.” Remote Code ExecutionCritical 
CVE-2025-2884CVE-2025-2884 is regarding a vulnerability in CG TPM2.0 Reference implementation’s CryptHmacSign helper function that is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key’s algorithm. Information DisclosureImportant 
CVE-2025-47827In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image. Security Feature BypassImportant 
CVE-2025-49708Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network. Elevation of PrivilegeCritical 
CVE-2025-55680Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55682Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. Security Feature BypassImportant 
CVE-2025-55683Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-55684Use-after-free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55688Use-after-free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55690Use-after-free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55691Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55692Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55693Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55694Improper access control in Windows Error Reporting allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55695Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-55696Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55697Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-55698Null pointer dereference in Windows DirectX allows an authorized attacker to deny service over a network. Denial of ServiceImportant 
CVE-2025-55699Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-58714Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-58718Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network. Remote Code ExecutionImportant 
CVE-2025-58720Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-58724Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-58725Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-58726Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network. Elevation of PrivilegeImportant 
CVE-2025-58727Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-58729Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. Denial of ServiceImportant 
CVE-2025-58730Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-58731Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-58733Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-58734Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-58736Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-58737Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-58738Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-58739Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. SpoofingImportant 
CVE-2025-59184Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-59187Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59188Exposure of sensitive information to an unauthorized actor in Windows Failover Cluster allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-59189Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59190Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally. Denial of ServiceImportant 
CVE-2025-59191Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59192Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59193Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Management Services allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59194Use of uninitialized resource in Windows Kernel allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59197Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-59198Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally. Denial of ServiceImportant 
CVE-2025-59203Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-59205Concurrent execution using shared resource with improper synchronization (‘race condition’) in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59208Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network. Information DisclosureImportant 
CVE-2025-59209Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-59210Elevation of Privilege in Windows Resilient File System (ReFS) Deduplication Service. Elevation of PrivilegeImportant 
CVE-2025-59213Improper neutralization of special elements used in an sql command (‘sql injection’) in Microsoft Configuration Manager allows an unauthorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59214Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. SpoofingImportant 
CVE-2025-59221Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-59222Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-59223Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-59224Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-59225Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-59226Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-59227Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Remote Code ExecutionCritical 
CVE-2025-59229Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally. Denial of ServiceImportant 
CVE-2025-59230Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59232Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-59234Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Remote Code ExecutionCritical 
CVE-2025-59236Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Remote Code ExecutionCritical 
CVE-2025-59238Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. Remote Code ExecutionImportant 
CVE-2025-59241Improper link resolution before file access (‘link following’) in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59244External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. SpoofingImportant 
CVE-2025-59248Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. SpoofingImportant 
CVE-2025-59253Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. Denial of ServiceImportant 
CVE-2025-59260Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally. Information DisclosureImportant 
CVE-2025-59261Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59275Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59278Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59285Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59287Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. Remote Code ExecutionCritical 
CVE-2025-59288Improper verification of cryptographic signature in GitHub allows an unauthorized attacker to perform spoofing over an adjacent network. SpoofingModerate 
CVE-2025-59289Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeImportant 
CVE-2025-59291External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeCritical 
CVE-2025-59292External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. Elevation of PrivilegeCritical 
CVE-2025-59497Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally. Denial of ServiceImportant 
CVE-2025-59502Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. Denial of ServiceModerate 

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

Kaaviya
Kaaviyahttps://cyberpress.org/
Kaaviya is a Security Editor and fellow reporter with Cyber Press. She is covering various cyber security incidents happening in the Cyber Space.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here