Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs

On Tuesday, Microsoft took significant steps to enhance the security of its software by addressing a total of 80 vulnerabilities, among which eight have been classified as Critical and 72 as Important. Notably, none of these vulnerabilities have been exploited in the wild as zero-day threats. This month’s patching effort mirrors last month’s focus, with 38 of the disclosed flaws related to privilege escalation, followed by 22 concerning remote code execution, 14 linked to information disclosure, and three associated with denial-of-service attacks.

Satnam Narang, a senior staff research engineer at Tenable, pointed out that this marks the third occasion this year where Microsoft has patched more elevation of privilege vulnerabilities than remote code execution flaws. In fact, nearly half of the vulnerabilities disclosed this month—47.5%—fall under the category of privilege escalation.

Key Vulnerabilities and Their Implications

Among the vulnerabilities addressed, one stands out due to its public disclosure: CVE-2025-55234, which has a CVSS score of 8.8. This privilege escalation issue in Windows SMB could potentially allow attackers to execute relay attacks, depending on system configuration. Microsoft emphasized that the update not only patches the vulnerability but also enhances auditing capabilities for SMB client compatibility, enabling customers to assess their environments for potential incompatibilities prior to implementing necessary security measures.

Adam Barnett, lead software engineer at Rapid7, highlighted that the advisory for CVE-2025-55234 underscores the importance of comprehensive security measures beyond mere patching. He noted that the patches provide administrators with enhanced auditing options to ensure their SMB Server interacts securely with clients that support recommended hardening practices.

Mike Walters, president and co-founder of Action, elaborated on the vulnerability’s origins, explaining that SMB sessions can be established without adequate validation of the authentication context when key security measures are absent. This oversight creates opportunities for man-in-the-middle relay attacks, allowing attackers to capture and forward authentication materials for unauthorized access.

Among the vulnerabilities with the highest severity this month is CVE-2025-54914, which boasts a perfect CVSS score of 10.0. This critical flaw affects Azure Networking and could lead to privilege escalation without requiring customer intervention, as it is cloud-related. Additionally, attention is drawn to a remote code execution flaw in the Microsoft High Performance Compute (HPC) Pack (CVE-2025-55232, CVSS score: 9.8) and an elevation of privilege issue affecting Windows NTLM (CVE-2025-54918, CVSS score: 8.8), which could enable attackers to gain SYSTEM privileges.

Kev Breen, senior director of threat research at Immersive, noted that the patch for the NTLM vulnerability indicates that improper authentication could allow an authorized attacker to elevate privileges over a network, suggesting that attackers may need prior access to NTLM hashes or user credentials.

The update also addresses a security flaw in Newtonsoft.Json, a third-party component utilized in SQL Server, which could be exploited to trigger a denial-of-service condition. Furthermore, two privilege escalation vulnerabilities in Windows BitLocker (CVE-2025-54911 and CVE-2025-54912) have been identified, both of which were discovered and reported by Microsoft’s Hussein Alrubaye.

Enhancing BitLocker Security

The two BitLocker vulnerabilities add to a series of four others, collectively referred to as BitUnlocker, which Microsoft patched in July 2025. Successful exploitation of any of these vulnerabilities could allow an attacker with physical access to bypass BitLocker protections and access encrypted data. To bolster BitLocker security, Microsoft researchers recommend enabling TPM+PIN for pre-boot authentication, which significantly reduces attack surfaces.

To further mitigate potential downgrade attacks on BitLocker, the implementation of the REVISE mitigation is advised. This mechanism enforces secure versioning across critical boot components, preventing downgrades that could reintroduce known vulnerabilities.

As the landscape of cybersecurity evolves, new techniques such as BitLockMove, developed by security researcher Fabian Mosch, have emerged. This method involves the remote manipulation of BitLocker registry keys via Windows Management Instrumentation (WMI) to hijack specific COM objects of BitLocker, potentially leading to domain escalation if the interactive user possesses excessive privileges.

Broader Industry Response

In addition to Microsoft’s updates, various other vendors have released security patches over recent weeks to address several vulnerabilities. These include major players such as Adobe, Cisco, IBM, and numerous Linux distributions, among others. This collective effort underscores the ongoing commitment within the tech industry to enhance security and protect users from emerging threats.

Winsage
Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs