Microsoft this week pushed safety updates to repair greater than 60 vulnerabilities in its Home windows working programs and supported software program, together with not less than one zero-day bug that’s already being exploited. Microsoft additionally fastened a glitch that prevented some Home windows 10 customers from benefiting from an additional 12 months of safety updates, which is good as a result of the zero-day flaw and different important weaknesses have an effect on all variations of Home windows, together with Home windows 10.
Affected merchandise this month embody the Home windows OS, Workplace, SharePoint, SQL Server, Visible Studio, GitHub Copilot, and Azure Monitor Agent. The zero-day risk issues a reminiscence corruption bug deep within the Home windows innards referred to as CVE-2025-62215. Regardless of the flaw’s zero-day standing, Microsoft has assigned it an “necessary” score relatively than important, as a result of exploiting it requires an attacker to have already got entry to the goal’s machine.
“Most of these vulnerabilities are sometimes exploited as a part of a extra complicated assault chain,” mentioned Johannes Ullrich, dean of analysis for the SANS Know-how Institute. “Nonetheless, exploiting this particular vulnerability is more likely to be comparatively simple, given the existence of prior comparable vulnerabilities.”
Ben McCarthy, lead cybersecurity engineer at Immersive, referred to as consideration to CVE-2025-60274, a important weak spot in a core Home windows graphic part (GDI+) that’s utilized by an enormous variety of functions, together with Microsoft Workplace, internet servers processing photographs, and numerous third-party functions.
“The patch for this ought to be a corporation’s highest precedence,” McCarthy mentioned. “Whereas Microsoft assesses this as ‘Exploitation Much less Doubtless,’ a 9.8-rated flaw in a ubiquitous library like GDI+ is a important danger.”
Microsoft patched a important bug in Workplace — CVE-2025-62199 — that may result in distant code execution on a Home windows system. Alex Vovk, CEO and co-founder of Action1, mentioned this Workplace flaw is a excessive precedence as a result of it’s low complexity, wants no privileges, and might be exploited simply by viewing a booby-trapped message within the Preview Pane.
Most of the extra regarding bugs addressed by Microsoft this month have an effect on Home windows 10, an working system that Microsoft formally ceased supporting with patches final month. As that deadline rolled round, nevertheless, Microsoft started providing Home windows 10 customers an additional 12 months of free updates, as long as they register their PC to an lively Microsoft account.
Judging from the feedback on final month’s Patch Tuesday publish, that registration labored for lots of Home windows 10 customers, however some readers reported the choice for an additional 12 months of updates was by no means provided. Nick Carroll, cyber incident response supervisor at Nightwing, notes that Microsoft has just lately launched an out-of-band replace to deal with points when making an attempt to enroll within the Home windows 10 Shopper Prolonged Safety Replace program.
“In case you plan to take part in this system, be sure you replace and set up KB5071959 to deal with the enrollment points,” Carroll mentioned. “After that’s put in, customers ought to be capable to set up different updates corresponding to right this moment’s KB5068781 which is the newest replace to Home windows 10.”
Chris Goettl at Ivanti notes that along with Microsoft updates right this moment, third-party updates from Adobe and Mozilla have already been launched. Additionally, an replace for Google Chrome is predicted quickly, which implies Edge may even be in want of its personal replace.
The SANS Web Storm Middle has a clickable breakdown of every particular person repair from Microsoft, listed by severity and CVSS rating. Enterprise Home windows admins concerned in testing patches earlier than rolling them out ought to control askwoody.com, which regularly has the thin on any updates gone awry.
As at all times, please don’t neglect to again up your information (if not your total system) at common intervals, and be happy to hold forth within the feedback in case you expertise issues putting in any of those fixes.
[Author’s note: This post was intended to appear on the homepage on Tuesday, Nov. 11. I’m still not sure how it happened, but somehow this story failed to publish that day. My apologies for the oversight.]







