Skip to main content
Mallory

Microsoft November 2025 Patch Tuesday Security Updates

widely-deployed-product-advisoryactively-exploited-vulnerabilityendpoint-software-vulnerabilityend-of-life-softwarecloud-service-vulnerability
Updated March 21, 2026 at 03:26 PM28 sources
Share:
Microsoft November 2025 Patch Tuesday Security Updates

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Microsoft released security updates addressing 63 vulnerabilities as part of its November 2025 Patch Tuesday, including five rated as critical and one zero-day vulnerability actively exploited in the wild. The zero-day, tracked as CVE-2025-62215, is a Windows Kernel elevation of privilege flaw that allows a local, authenticated attacker to gain higher privileges due to a race condition. Other critical vulnerabilities include remote code execution issues in GDI+, Microsoft Office, and Visual Studio, as well as an elevation of privilege vulnerability in the DirectX Graphics Kernel. The GDI+ vulnerability (CVE-2025-60724) is particularly notable for its high CVSS score and the potential for exploitation via specially crafted metafiles, which could be triggered through documents or web services without user interaction.

Security researchers note that while the number of vulnerabilities is significant, the overall risk profile is considered moderate, with no "Patch Now" emergencies aside from the actively exploited zero-day. The update also marks the first extended security update (ESU) for Windows 10, with Microsoft urging organizations still using the unsupported OS to upgrade or enroll in the ESU program. The vulnerabilities span a wide range of Microsoft products and services, including Azure, Dynamics 365, Visual Studio, and various Windows components, emphasizing the need for comprehensive patch management across enterprise environments.

Timeline

  1. Nov 12, 2025

    Government and security organizations issue advisories urging prompt patching

    By 2025-11-12, organizations such as the Canadian Centre for Cyber Security and CIS, along with numerous security outlets, had issued advisories summarizing the November Microsoft fixes and recommending rapid deployment. Their notices emphasized the risk posed by the actively exploited kernel flaw and other critical vulnerabilities.

  2. Nov 11, 2025

    Security vendors publish technical analyses and detection guidance for November patches

    On and immediately after release day, multiple security firms and researchers including Talos, ZDI, CrowdStrike, Arctic Wolf, Qualys, and others published reviews of the November 2025 updates. These analyses highlighted the zero-day, identified other critical vulnerabilities, and in some cases provided defensive guidance such as Snort coverage and prioritization recommendations.

  3. Nov 11, 2025

    Microsoft fixes critical Windows Graphics Component flaw CVE-2025-60724

    Microsoft also patched CVE-2025-60724, a high-severity heap-based buffer overflow in the Windows Graphics Component/GDI+ that could enable remote code execution, including through malicious files or crafted metafiles in documents. Multiple sources highlighted it as one of the most dangerous bugs in the November release.

  4. Nov 11, 2025

    Microsoft patches actively exploited Windows kernel zero-day CVE-2025-62215

    The November 2025 updates fixed CVE-2025-62215, a Windows Kernel elevation-of-privilege vulnerability caused by a race condition that can let an attacker gain SYSTEM privileges. Microsoft reported the flaw as actively exploited in the wild at the time of patching.

  5. Nov 11, 2025

    Microsoft releases November 2025 Patch Tuesday updates

    On 2025-11-11, Microsoft issued its November 2025 Patch Tuesday security updates, with most sources reporting fixes for 63 vulnerabilities across Windows, Office, .NET, developer tools, and other products. The release also marked one of the first major monthly security rollups after Windows 10 entered its Extended Security Update phase.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

November 16, 2025 at 12:00 AM

5 more from sources like malwarebytes labs, security online info, outpost24 blog, cyberthrone and the hacker news

Related Stories

Microsoft October 2025 Patch Tuesday Addresses Multiple Zero-Days and Over 170 Vulnerabilities

Microsoft October 2025 Patch Tuesday Addresses Multiple Zero-Days and Over 170 Vulnerabilities

Microsoft released its October 2025 Patch Tuesday security updates, addressing a total of 172 vulnerabilities across its product suite, including six zero-day vulnerabilities. The update marks a significant milestone as it is the final free security update for Windows 10, which has now reached its end of support, requiring users and enterprises to enroll in Extended Security Updates (ESU) for continued protection. Among the vulnerabilities patched, eight were rated as 'Critical,' with five being remote code execution flaws and three classified as elevation of privilege vulnerabilities. The breakdown of vulnerabilities includes 80 elevation of privilege, 11 security feature bypass, 31 remote code execution, 28 information disclosure, 11 denial of service, and 10 spoofing vulnerabilities. Notably, two of the zero-day vulnerabilities were publicly disclosed prior to the patch, affecting Windows SMB Server and Microsoft SQL Server, while three zero-days were actively exploited in the wild. One of the exploited zero-days, CVE-2025-24990, involved the Agere Modem driver, which was being abused to gain administrative privileges, prompting Microsoft to remove the vulnerable driver from supported Windows operating systems. The Patch Tuesday release also included updates for a wide range of Microsoft products and components, such as .NET, Visual Studio, Active Directory Federation Services, Microsoft Office suite, Azure services, Windows authentication methods, and various Windows system components. The update was described as the largest Patch Tuesday release to date, with 167 CVEs directly patched according to some sources, excluding additional vulnerabilities in Chromium, MITRE, GitHub, CERT/CC, and cloud services that were addressed separately. The security updates did not include fixes for vulnerabilities in Microsoft Edge, Azure, or Mariner that were released earlier in the month. Microsoft emphasized the importance of these updates, especially for organizations still running Windows 10, as the cessation of free support increases the risk of exposure to unpatched vulnerabilities. The comprehensive nature of the update reflects the ongoing complexity and breadth of the Microsoft ecosystem, with critical patches spanning from core Windows components to cloud and developer tools. Security professionals are advised to prioritize the deployment of these patches, particularly those addressing actively exploited zero-days and critical remote code execution vulnerabilities. The update also highlights the evolving threat landscape, with attackers increasingly targeting third-party drivers and core system components to escalate privileges. Organizations are encouraged to review the full list of patched vulnerabilities and assess their exposure, especially in light of the end of support for Windows 10. The October 2025 Patch Tuesday underscores the necessity of timely patch management and the challenges posed by legacy systems in maintaining a secure enterprise environment.

1 months ago
Microsoft Patch Tuesday December 2025 Addresses Actively Exploited Zero-Days

Microsoft Patch Tuesday December 2025 Addresses Actively Exploited Zero-Days

Microsoft released its December 2025 Patch Tuesday updates, addressing 57 security vulnerabilities across Windows 10, Windows 11, Windows Server, Office, and related services. Among these, three zero-day vulnerabilities were highlighted: CVE-2025-62221, an actively exploited privilege escalation flaw in the Windows Cloud Files Mini Filter Driver; CVE-2025-64671, a remote code execution vulnerability in GitHub Copilot for JetBrains; and CVE-2025-54100, a remote code execution issue in Windows PowerShell. The update also introduced a new warning in PowerShell to alert users when the `Invoke-WebRequest` command fetches web pages without safe parameters, aiming to prevent script-based attacks that exploit unsafe web content retrieval. Throughout 2025, Microsoft addressed a total of 1,130 CVEs via Patch Tuesday releases, with 41 zero-day vulnerabilities patched, including 24 that were exploited in the wild. Elevation of Privilege and Remote Code Execution vulnerabilities made up the majority of the year's patches, reflecting ongoing attacker focus on these vectors. The December update continues Microsoft's trend of prioritizing critical and important vulnerabilities, reinforcing the need for organizations to promptly apply security updates to mitigate active threats.

1 months ago
Microsoft December 2025 Patch Tuesday Addresses Zero-Days and 57 Vulnerabilities

Microsoft December 2025 Patch Tuesday Addresses Zero-Days and 57 Vulnerabilities

Microsoft released its December 2025 Patch Tuesday updates, addressing 57 security vulnerabilities across its product suite, including three zero-day flaws. Among the most critical issues patched is CVE-2025-62221, an actively exploited elevation of privilege vulnerability in the Windows Cloud Files Mini Filter Driver, which could allow attackers to gain SYSTEM privileges. The updates also include a fix for a remote code execution zero-day in PowerShell (CVE-2025-54100), which now prompts users with a security warning when using the `Invoke-WebRequest` command, and other critical vulnerabilities affecting Windows 10 and 11, as well as related server products. The updates are mandatory for supported systems, including those enrolled in the Extended Security Update (ESU) program, and require a system restart upon installation. CISA has added CVE-2025-62221 to its Known Exploited Vulnerabilities Catalog, urging all organizations to prioritize remediation due to evidence of active exploitation. Security advisories and technical analyses from multiple sources highlight the importance of promptly applying these patches, as the vulnerabilities present significant risks for privilege escalation and remote code execution. The December update also marks the continued support for Windows 10 through ESU, with no new features introduced, focusing solely on security and bug fixes. Organizations are advised to review the full list of addressed CVEs and ensure all relevant systems are updated to mitigate potential threats.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Microsoft November 2025 Patch Tuesday Security Updates | Mallory