Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws

Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws

Microsoft’s October 2025 Patch Tuesday addresses 172 security flaws, including six zero-day vulnerabilities, with a focus on critical remote code execution and privilege escalation issues. This update also marks the end of support for Windows 10, with users encouraged to adopt Extended Security Updates for continued protection. #Windows10 #ZeroDayVulnerabilities

Keypoints

  • Microsoft released security updates fixing 172 vulnerabilities, including six zero-days, in October 2025.
  • Five critical vulnerabilities allow remote code execution or privilege escalation, affecting various Microsoft products.
  • Windows 10 reached its end of support, with options for Extended Security Updates available for users.
  • Zero-day flaws in Windows SMB Server and SQL Server were addressed, with some exploits already publicly disclosed.
  • Other organizations like Cisco, Adobe, and Oracle also released significant security patches in October 2025.

Today is Microsoft’s October 2025 Patch Tuesday, which includes security updates for 172 flaws, including six zero-day vulnerabilities.

This Patch Tuesday also addresses eight “Critical” vulnerabilities, five of which are remote code execution vulnerabilities and three are elevation of privilege vulnerabilities.

The number of bugs in each vulnerability category is listed below:

  • 80 Elevation of Privilege Vulnerabilities
  • 11 Security Feature Bypass Vulnerabilities
  • 31 Remote Code Execution Vulnerabilities
  • 28 Information Disclosure Vulnerabilities
  • 11 Denial of Service Vulnerabilities
  • 10 Spoofing Vulnerabilities

When BleepingComputer reports on the Patch Tuesday security updates, we only count those released today by Microsoft. Therefore, the number of flaws does not include those fixed in Azure, Mariner, Microsoft Edge, and other vulnerabilities earlier this month.

Notably, Windows 10 reaches the end of support today, with this being the last Patch Tuesday where Microsoft provides free security updates to the venerable operating system.

To continue receiving security updates on Windows 10, consumers can sign up for a year of Extended Security Updates (ESU), and enterprises can sign up for a total of three years.

To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5066835 and KB5066793 updates.

6 zero-days in the October Patch Tuesday

This month’s Patch Tuesday fixes two publicly disclosed zero-day flaws in Windows SMB Server and Microsoft SQL Server. Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.

The three exploited zero-days are:

CVE-2025-24990 – Windows Agere Modem Driver Elevation of Privilege Vulnerability

Microsoft is removing an Agere Modem driver that was abused to gain administrative privileges.

“Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems,” explains Microsoft.

“This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.”

Microsoft warns that removing this driver will cause related Fax modem hardware to cease functioning.

Microsoft has attributed the flaw to Fabian Mosch and Jordan Jay.

CVE-2025-59230 – Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

Microsoft fixed a Windows Remote Access Connection Manager flaw that was exploited to gain SYSTEM privileges.

“Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally,” explains Microsoft.

Microsoft says attackers must “invest in some measurable amount of effort in preparation or execution” to successfully exploit the flaw.

The vulnerability has been attributed the flaw internally to Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC).

CVE-2025-47827 – MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11

Microsoft has added fixes for a Secure Boot bypass in IGEL OS.

“In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image,” explains Microsoft.

“MITRE created this CVE on their behalf. The documented Windows updates incorporate updates in IGEL OS which address this vulnerability. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.”

The flaw was discovered by Zack Didcott and publicly disclosed in a GitHub writeup.

The publicly exploited flaws are:

CVE-2025-0033 – AMD CVE-2025-0033: RMP Corruption During SNP Initialization

Microsoft is working on a fix for an AMD flaw that could impact memory integrity.

“CVE-2025-0033 is a vulnerability in AMD EPYC processors using Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP). It involves a race condition during Reverse Map Table (RMP) initialization that could allow a malicious or compromised hypervisor to modify RMP entries before they are locked, potentially impacting the integrity of SEV-SNP guest memory. This issue does not expose plaintext data or secrets and requires privileged control of the hypervisor to exploit,” explains Microsoft.

“Across Azure Confidential Computing products, multiple security guardrails are in place to prevent host compromise, combining isolation, integrity verification and continuous monitoring. All host operations follow audited and approved management pathways, with administrative access strictly controlled, limited and logged. Together, these protections reduce the risk of host compromise or unauthorized memory manipulation, helping ensure that confidential workloads and customer VMs maintain their confidentiality and integrity on Azure hosts.”

Microsoft states that the security updates for this vulnerability in Azure Confidential Computing’s (ACC) AMD-based clusters are not yet complete. Customers will be notified via Azure Service Health Alerts when they are available to deploy.

The flaws were publicly disclosed by AMD yesterday and discovered by Benedict Schlueter, Supraja Sridhara, and Shweta Shinde from ETH Zurich.

CVE-2025-24052 – Windows Agere Modem Driver Elevation of Privilege Vulnerability

This is a similar flaw to CVE-2025-24990, described above, which appears to have been publicly disclosed as well.

Microsoft reiterates that the flaw impacts all versions of Windows and that the modem does not have to be used to exploit the flaw.

“All supported versions of Windows can be affected by a successful exploitation of this vulnerability, even if the modem is not actively being used,” explains Microsoft.

This CVE is not attributed to any researchers.

CVE-2025-2884 – Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation

Microsoft has fixed a TCG TPM 2.0 flaw that could lead to information disclosure or denial of service of the TPM.

“CVE-2025-2884 is regarding a vulnerability in CG TPM2.0 Reference implementation’s CryptHmacSign helper function that is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key’s algorithm,” explains Microsoft.

“CERT/CC created this CVE on their behalf. The documented Windows updates incorporate updates in CG TPM2.0 Reference implementation which address this vulnerability. Please see CVE-2025-2884 for more information.”

The flaw has been attributed to the Trusted Computing Group (TCG) and an anonymous researcher. TCG publicly disclosed the flaw in this writeup.

Recent updates from other companies

Other vendors who released updates or advisories in October 2025 include:

The October 2025 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the October 2025 Patch Tuesday updates.

To access the full description of each vulnerability and the systems it affects, you can view the full report here.

Tag CVE ID CVE Title Severity
.NET CVE-2025-55247 .NET Elevation of Privilege Vulnerability Important
.NET, .NET Framework, Visual Studio CVE-2025-55248 .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability Important
Active Directory Federation Services CVE-2025-59258 Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability Important
Agere Windows Modem Driver CVE-2025-24990 Windows Agere Modem Driver Elevation of Privilege Vulnerability Important
Agere Windows Modem Driver CVE-2025-24052 Windows Agere Modem Driver Elevation of Privilege Vulnerability Important
AMD Restricted Memory Page CVE-2025-0033 AMD CVE-2025-0033: RMP Corruption During SNP Initialization Critical
ASP.NET Core CVE-2025-55315 ASP.NET Security Feature Bypass Vulnerability Important
Azure Connected Machine Agent CVE-2025-47989 Azure Connected Machine Agent Elevation of Privilege Vulnerability Important
Azure Connected Machine Agent CVE-2025-58724 Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege Vulnerability Important
Azure Entra ID CVE-2025-59218 Azure Entra ID Elevation of Privilege Vulnerability Critical
Azure Entra ID CVE-2025-59246 Azure Entra ID Elevation of Privilege Vulnerability Critical
Azure Local CVE-2025-55697 Azure Local Elevation of Privilege Vulnerability Important
Azure Monitor CVE-2025-55321 Azure Monitor Log Analytics Spoofing Vulnerability Critical
Azure Monitor Agent CVE-2025-59285 Azure Monitor Agent Elevation of Privilege Vulnerability Important
Azure Monitor Agent CVE-2025-59494 Azure Monitor Agent Elevation of Privilege Vulnerability Important
Azure PlayFab CVE-2025-59247 Azure PlayFab Elevation of Privilege Vulnerability Critical
Confidential Azure Container Instances CVE-2025-59292 Azure Compute Gallery Elevation of Privilege Vulnerability Critical
Confidential Azure Container Instances CVE-2025-59291 Confidential Azure Container Instances Elevation of Privilege Vulnerability Critical
Connected Devices Platform Service (Cdpsvc) CVE-2025-59191 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Important
Connected Devices Platform Service (Cdpsvc) CVE-2025-55326 Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability Important
Connected Devices Platform Service (Cdpsvc) CVE-2025-58719 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability Important
Copilot CVE-2025-59272 Copilot Spoofing Vulnerability Critical
Copilot CVE-2025-59252 M365 Copilot Spoofing Vulnerability Critical
Copilot CVE-2025-59286 Copilot Spoofing Vulnerability Critical
Data Sharing Service Client CVE-2025-59200 Data Sharing Service Spoofing Vulnerability Important
Games CVE-2025-59489 MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability Important
GitHub CVE-2025-59288 Playwright Spoofing Vulnerability Moderate
Inbox COM Objects CVE-2025-58735 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Inbox COM Objects CVE-2025-58732 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Inbox COM Objects CVE-2025-59282 Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Inbox COM Objects CVE-2025-58733 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Inbox COM Objects CVE-2025-58734 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Inbox COM Objects CVE-2025-58738 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Inbox COM Objects CVE-2025-58731 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Inbox COM Objects CVE-2025-58730 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Inbox COM Objects CVE-2025-58736 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability Important
Internet Explorer CVE-2025-59295 Windows URL Parsing Remote Code Execution Vulnerability Important
JDBC Driver for SQL Server CVE-2025-59250 JDBC Driver for SQL Server Spoofing Vulnerability Important
Mariner CVE-2025-39943 ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer Critical
Mariner CVE-2025-39946 tls: make sure to abort the stream if headers are bogus Moderate
Mariner CVE-2025-39942 ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size Moderate
Mariner CVE-2025-39951 um: virtio_uml: Fix use-after-free after put_device in probe Moderate
Mariner CVE-2025-39932 smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) Moderate
Mariner CVE-2025-39949 qed: Don’t collect too many protection override GRC elements Moderate
Mariner CVE-2025-39937 net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer Moderate
Mariner CVE-2025-39955 tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). Moderate
Mariner CVE-2025-39895 sched: Fix sched_numa_find_nth_cpu() if mask offline Moderate
Mariner CVE-2025-11413 GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds Moderate
Mariner CVE-2025-11414 GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds Moderate
Mariner CVE-2025-39938 ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed Moderate
Mariner CVE-2025-11495 GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow Moderate
Mariner CVE-2025-39934 drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ Moderate
Mariner CVE-2025-39929 smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path Moderate
Mariner CVE-2025-39945 cnic: Fix use-after-free bugs in cnic_delete_task Important
Mariner CVE-2025-39907 mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer Critical
Mariner CVE-2025-39913 tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. Moderate
Mariner CVE-2025-39952 wifi: wilc1000: avoid buffer overflow in WID string configuration Important
Mariner CVE-2025-39940 dm-stripe: fix a possible integer overflow Moderate
Mariner CVE-2025-39953 cgroup: split cgroup_destroy_wq into 3 workqueues Moderate
Mariner CVE-2023-53469 af_unix: Fix null-ptr-deref in unix_stream_sendpage(). Important
Mariner CVE-2025-39914 tracing: Silence warning when chunk allocation fails in trace_pid_write Moderate
Mariner CVE-2025-39905 net: phylink: add lock for serializing concurrent pl->phydev writes with resolver Moderate
Mariner CVE-2025-39920 pcmcia: Add error handling for add_interval() in do_validate_mem() Moderate
Mariner CVE-2025-39911 i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path Low
Mariner CVE-2025-39958 iommu/s390: Make attach succeed when the device was surprise removed Low
Mariner CVE-2025-8291 ZIP64 End of Central Directory (EOCD) Locator record offset not checked Moderate
Mariner CVE-2025-39957 wifi: mac80211: increase scan_ies_len for S1G Low
Mariner CVE-2025-46818 Redis: Authenticated users can execute LUA scripts as a different user Moderate
Mariner CVE-2025-46817 Lua library commands may lead to integer overflow and potential RCE Important
Mariner CVE-2022-50502 mm: /proc/pid/smaps_rollup: fix no vma’s null-deref Moderate
Mariner CVE-2025-39944 octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() Important
Mariner CVE-2025-11234 Qemu-kvm: vnc websocket handshake use-after-free Moderate
Mariner CVE-2025-49844 Redis Lua Use-After-Free may lead to remote code execution Critical
Mariner CVE-2025-10729 Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG Important
Mariner CVE-2025-39961 iommu/amd/pgtbl: Fix possible race while increase page table level Moderate
Mariner CVE-2025-61984 ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.) Low
Mariner CVE-2025-46819 Redis is vulnerable to DoS via specially crafted LUA scripts Moderate
Mariner CVE-2025-37727 Elasticsearch Insertion of sensitive information in log file Moderate
Mariner CVE-2025-11412 GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds Moderate
Mariner CVE-2025-39931 crypto: af_alg – Set merge to zero early in af_alg_sendmsg Moderate
Mariner CVE-2025-39933 smb: client: let recv_done verify data_offset, data_length and remaining_data_length Moderate
Mariner CVE-2025-39947 net/mlx5e: Harden uplink netdev access against device unbind Moderate
Mariner CVE-2025-61985 ssh in OpenSSH before 10.1 allows the ‘