Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched

Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched

Microsoft rolled out its October 2025 Patch Tuesday updates, addressing a staggering 172 vulnerabilities across its ecosystem, including four zero-day flaws, of which two are actively exploited in the wild.

This monthly security bulletin underscores the relentless pace of threat evolution, with critical remote code execution bugs in Office apps and elevation of privilege issues in Windows components dominating the fixes.

As organizations grapple with end-of-support deadlines for legacy systems like Windows 10, timely patching remains essential to mitigate risks from state-sponsored actors and cybercriminals.​

Impact Count
Elevation of Privilege 80
Remote Code Execution 31
Information Disclosure 28
Security Feature Bypass 11
Denial of Service 11
Spoofing 10
Tampering 1
Total 172

The updates target a broad array of products, from core Windows operating systems to Azure cloud services and the Microsoft Office suite.

Among the highlights, Microsoft patched CVE-2025-59234 and CVE-2025-59236, both use-after-free vulnerabilities in Microsoft Office and Excel that enable remote code execution when users open malicious files.

These flaws, rated critical with CVSS scores around 7.8, require no authentication and could allow attackers to gain full system control, potentially leading to data theft or ransomware deployment.

Similarly, CVE-2025-49708 in the Microsoft Graphics Component exposes systems to privilege escalation over networks, exploiting memory corruption to bypass security boundaries.​

Critical Vulnerabilities Patched

Several critical entries demand immediate attention due to their potential for widespread exploitation.

For instance, CVE-2025-59291 and CVE-2025-59292 involve external control of file paths in Azure Container Instances and Compute Gallery, allowing authorized attackers to escalate privileges locally and potentially compromise cloud workloads.

These elevation of privilege bugs, also critical, highlight ongoing risks in hybrid environments where misconfigurations amplify impact.

Another vulnerability is CVE-2016-9535, a long-standing LibTIFF heap buffer overflow re-addressed in this cycle, which could trigger remote code execution in image-processing scenarios, affecting legacy apps still in use.​

The zero-days add urgency: CVE-2025-2884, an out-of-bounds read in TCG TPM2.0 reference implementation, stems from inadequate validation in cryptographic signing functions, leading to information disclosure. Publicly known via CERT/CC, it affects trusted platform modules integral to secure boot processes.

Meanwhile, CVE-2025-47827 enables Secure Boot bypass in IGEL OS versions before 11 through improper signature verification, allowing crafted root filesystems to mount unverified images as a vector for persistent malware.

CVE-2025-59230, another exploited flaw in Windows Remote Access Connection Manager, involves improper access controls for local privilege escalation.

Microsoft confirms no public exploits for most others, but the duo’s active abuse by threat actors, such as nation-state groups, necessitates rapid deployment.​

Deserialization issues in Windows Server Update Service (CVE-2025-59287) further elevate concerns, permitting unauthenticated remote code execution over networks, a prime target for supply-chain attacks.

In total, the bulletin includes 11 critical remote code executions and elevations, with many tied to memory safety errors like use-after-free and buffer overflows prevalent in older codebases.

Azure-specific fixes, such as those in CVE-2025-59285 for the Monitor Agent, address deserialization risks that could expose monitoring data to tampering.​

Other Important Vulnerabilities Patched

Beyond criticals, 150+ important vulnerabilities cover elevation of privilege (over 60), information disclosure (around 30), and denial-of-service flaws.

Repeated patterns emerge in Windows PrintWorkflowUserSvc (CVE-2025-55684 through 55691), where use-after-free bugs allow local attackers to gain higher privileges during print operations, a common vector in enterprise printing environments.

Windows Kernel vulnerabilities like CVE-2025-55693 and CVE-2025-59187 involve improper input validation, potentially leaking kernel memory, or enabling ring-0 access.​

Spoofing risks appear in CVE-2025-59239 for File Explorer and CVE-2025-59248 for Exchange Server, where flawed validation could trick users into executing malicious actions or bypassing authentication.

BitLocker’s CVE-2025-55682 exposes a security feature bypass via physical attacks, underscoring hardware-software interplay vulnerabilities.

For cloud users, Azure Arc and Connected Machine Agent fixes (CVE-2025-58724) mitigate local escalations from access control lapses. Denial-of-service bugs, such as CVE-2025-55698 in DirectX and CVE-2025-58729 in Local Session Manager, could disrupt services through null dereferences or invalid inputs.​

CVE ID Vulnerability Details Type Severity
CVE-2016-9535 tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka “Predictor heap-buffer-overflow.”  Remote Code Execution Critical 
CVE-2025-2884 CVE-2025-2884 is regarding a vulnerability in CG TPM2.0 Reference implementation’s CryptHmacSign helper function that is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key’s algorithm.  Information Disclosure Important 
CVE-2025-47827 In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.  Security Feature Bypass Important 
CVE-2025-49708 Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network.  Elevation of Privilege Critical 
CVE-2025-55680 Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55682 Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.  Security Feature Bypass Important 
CVE-2025-55683 Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-55684 Use-after-free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55688 Use-after-free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55690 Use-after-free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55691 Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55692 Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55693 Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55694 Improper access control in Windows Error Reporting allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55695 Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-55696 Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55697 Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-55698 Null pointer dereference in Windows DirectX allows an authorized attacker to deny service over a network.  Denial of Service Important 
CVE-2025-55699 Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-58714 Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-58718 Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.  Remote Code Execution Important 
CVE-2025-58720 Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-58724 Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-58725 Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-58726 Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.  Elevation of Privilege Important 
CVE-2025-58727 Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-58729 Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.  Denial of Service Important 
CVE-2025-58730 Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-58731 Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-58733 Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-58734 Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-58736 Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-58737 Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-58738 Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-58739 Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.  Spoofing Important 
CVE-2025-59184 Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-59187 Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59188 Exposure of sensitive information to an unauthorized actor in Windows Failover Cluster allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-59189 Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59190 Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally.  Denial of Service Important 
CVE-2025-59191 Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59192 Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59193 Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows Management Services allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59194 Use of uninitialized resource in Windows Kernel allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59197 Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-59198 Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally.  Denial of Service Important 
CVE-2025-59203 Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-59205 Concurrent execution using shared resource with improper synchronization (‘race condition’) in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59208 Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.  Information Disclosure Important 
CVE-2025-59209 Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-59210 Elevation of Privilege in Windows Resilient File System (ReFS) Deduplication Service.  Elevation of Privilege Important 
CVE-2025-59213 Improper neutralization of special elements used in an sql command (‘sql injection’) in Microsoft Configuration Manager allows an unauthorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59214 Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.  Spoofing Important 
CVE-2025-59221 Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-59222 Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-59223 Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-59224 Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-59225 Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-59226 Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-59227 Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.  Remote Code Execution Critical 
CVE-2025-59229 Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally.  Denial of Service Important 
CVE-2025-59230 Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59232 Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-59234 Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.  Remote Code Execution Critical 
CVE-2025-59236 Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.  Remote Code Execution Critical 
CVE-2025-59238 Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.  Remote Code Execution Important 
CVE-2025-59241 Improper link resolution before file access (‘link following’) in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59244 External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.  Spoofing Important 
CVE-2025-59248 Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.  Spoofing Important 
CVE-2025-59253 Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.  Denial of Service Important 
CVE-2025-59260 Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally.  Information Disclosure Important 
CVE-2025-59261 Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59275 Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59278 Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59285 Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59287 Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.  Remote Code Execution Critical 
CVE-2025-59288 Improper verification of cryptographic signature in GitHub allows an unauthorized attacker to perform spoofing over an adjacent network.  Spoofing Moderate 
CVE-2025-59289 Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Important 
CVE-2025-59291 External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Critical 
CVE-2025-59292 External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.  Elevation of Privilege Critical 
CVE-2025-59497 Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally.  Denial of Service Important 
CVE-2025-59502 Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.  Denial of Service Moderate 

This Patch Tuesday coincides with Windows 10’s end-of-support on October 14, 2025, amplifying the stakes for unpatched legacy deployments.

Microsoft urges enabling automatic updates via Windows Update or WSUS, prioritizing criticals like Office RCEs first. For enterprises, vulnerability management tools can scan for affected versions, such as Office 2016-2021 or Windows 10/11 builds pre-KB503 something.

No proof-of-concept code is publicly available for most, but indicators of compromise include anomalous Office crashes or Azure log anomalies. Experts recommend segmenting networks and monitoring for exploitation attempts post-patch.​

Previous Article

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Next Article

US seizes $15 billion in crypto from 'pig butchering' kingpin