{"id":9624,"date":"2025-12-11T06:26:13","date_gmt":"2025-12-11T06:26:13","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=9624"},"modified":"2025-12-11T06:26:13","modified_gmt":"2025-12-11T06:26:13","slug":"microsoft-patch-tuesday-december-2025-version-krebs-on-safety","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=9624","title":{"rendered":"Microsoft Patch Tuesday, December 2025 Version \u2013 Krebs on Safety"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Microsoft<\/strong> immediately pushed updates to repair at the least 56 safety flaws in its <strong>Home windows<\/strong> working programs and supported software program. This last Patch Tuesday of 2025 tackles one zero-day bug that&#8217;s already being exploited, in addition to two publicly disclosed vulnerabilities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-60331\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\" alt=\"\" width=\"749\" height=\"496\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png 923w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-768x508.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-782x518.png 782w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\"\/><\/p>\n<p>Regardless of releasing a lower-than-normal variety of safety updates these previous few months, Microsoft patched a whopping 1,129 vulnerabilities in 2025, an 11.9% enhance from 2024. In accordance with <strong>Satnam Narang<\/strong> at <strong>Tenable<\/strong>, this yr marks the second consecutive yr that Microsoft patched over one thousand vulnerabilities, and the third time it has completed so since its inception.<\/p>\n<p>The zero-day flaw patched immediately is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62221\" target=\"_blank\" rel=\"noopener\">CVE-2025-62221<\/a>, a privilege escalation vulnerability affecting <strong>Home windows 10<\/strong> and later editions. The weak spot resides in a part known as the \u201c<strong>Home windows Cloud Information Mini Filter Driver<\/strong>\u201d \u2014 a system driver that permits cloud functions to entry file system functionalities.<\/p>\n<p>\u201cThat is notably regarding, because the mini filter is integral to providers like OneDrive, Google Drive, and iCloud, and stays a core Home windows part, even when none of these apps had been put in,\u201d mentioned <strong>Adam Barnett<\/strong>, lead software program engineer at <strong>Rapid7<\/strong>.<\/p>\n<p>Solely three of the failings patched immediately earned Microsoft\u2019s most-dire \u201ccrucial\u201d ranking: Each <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62554\" target=\"_blank\" rel=\"noopener\">CVE-2025-62554<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62557\" target=\"_blank\" rel=\"noopener\">CVE-2025-62557<\/a> contain <strong>Microsoft Workplace<\/strong>, and each can exploited merely by viewing a booby-trapped e-mail message within the Preview Pane. One other crucial bug \u2014 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62562\" target=\"_blank\" rel=\"noopener\">CVE-2025-62562<\/a> \u2014 includes <strong>Microsoft Outlook<\/strong>, though Redmond says the Preview Pane is just not an assault vector with this one.<span id=\"more-72782\"\/><\/p>\n<p>However based on Microsoft, the vulnerabilities more than likely to be exploited from this month\u2019s patch batch are different (non-critical) privilege escalation bugs, together with:<\/p>\n<p>\u2013<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62458\" target=\"_blank\" rel=\"noopener\">CVE-2025-62458<\/a> \u2014 Win32k<br \/>\u2013<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62470\" target=\"_blank\" rel=\"noopener\">CVE-2025-62470<\/a> \u2014 Home windows Frequent Log File System Driver<br \/>\u2013<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-62472\" target=\"_blank\" rel=\"noopener\">CVE-2025-62472<\/a> \u2014 Home windows Distant Entry Connection Supervisor<br \/>\u2013<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59516\" target=\"_blank\" rel=\"noopener\">CVE-2025-59516<\/a> \u2014 Home windows Storage VSP Driver<br \/>\u2013<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59517\" target=\"_blank\" rel=\"noopener\">CVE-2025-59517<\/a> \u2014 Home windows Storage VSP Driver<\/p>\n<p><strong>Kev Breen<\/strong>, senior director of menace analysis at <strong>Immersive<\/strong>, mentioned privilege escalation flaws are noticed in nearly each incident involving host compromises.<\/p>\n<p>\u201cWe don\u2019t know why Microsoft has marked these particularly as extra probably, however the majority of those elements have traditionally been exploited within the wild or have sufficient technical element on earlier CVEs that it might be simpler for menace actors to weaponize these,\u201d Breen mentioned. \u201cBoth means, whereas not actively being exploited, these must be patched sooner slightly than later.\u201d<\/p>\n<p>One of many extra fascinating vulnerabilities patched this month is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-64671\" target=\"_blank\" rel=\"noopener\">CVE-2025-64671<\/a>, a distant code execution flaw within the <strong>Github Copilot Plugin for Jetbrains<\/strong>\u00a0AI-based coding assistant that&#8217;s utilized by Microsoft and GitHub. Breen mentioned this flaw would enable attackers to execute arbitrary code by tricking the massive language mannequin (LLM) into operating instructions that bypass the guardrails and add malicious directions within the consumer\u2019s \u201cauto-approve\u201d settings.<\/p>\n<p>CVE-2025-64671 is a part of a broader, extra systemic safety disaster that safety researcher <strong>Ari Marzuk<\/strong> has branded <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/maccarita.com\/posts\/idesaster\/\" target=\"_blank\" rel=\"noopener\">IDEsaster<\/a> (IDE\u00a0 stands for \u201cbuilt-in growth atmosphere\u201d), which encompasses greater than 30 separate vulnerabilities reported in practically a dozen market-leading AI coding platforms, together with <strong>Cursor<\/strong>, <strong>Windsurf<\/strong>, <strong>Gemini CLI<\/strong>, and <strong>Claude Code<\/strong>.<\/p>\n<p>The opposite publicly-disclosed vulnerability patched immediately is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-54100\" target=\"_blank\" rel=\"noopener\">CVE-2025-54100<\/a>, a distant code execution bug in <strong>Home windows Powershell<\/strong> on Home windows Server 2008 and later that enables an unauthenticated attacker to run code within the safety context of the consumer.<\/p>\n<p>For anybody in search of a extra granular breakdown of the safety updates Microsoft pushed immediately, try the roundup on the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20Patch%20Tuesday%20December%202025\/32550\" target=\"_blank\" rel=\"noopener\">SANS Web Storm Middle<\/a>. As all the time, please depart a notice within the feedback in case you expertise issues making use of any of this month\u2019s Home windows patches.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft immediately pushed updates to repair at the least 56 safety flaws in its Home windows working programs and supported software program. This last Patch Tuesday of 2025 tackles one zero-day bug that&#8217;s already being exploited, in addition to two publicly disclosed vulnerabilities. Regardless of releasing a lower-than-normal variety of safety updates these previous few [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[6583,406,262,618,1077,211,1078],"class_list":["post-9624","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-december","tag-edition","tag-krebs","tag-microsoft","tag-patch","tag-security","tag-tuesday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/9624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9624"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/9624\/revisions"}],"predecessor-version":[{"id":9625,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/9624\/revisions\/9625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/9626"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 16:47:25 UTC -->