Microsoft Patch Tuesday addresses 63 defects, including one actively exploited zero-day

In the latest installment of its monthly security updates, Microsoft has addressed a total of 63 vulnerabilities, including a particularly concerning zero-day exploit identified as CVE-2025-62215. This vulnerability, which impacts the Windows Kernel, carries a CVSS rating of 7.0, indicating a high level of attack complexity. According to Microsoft, the exploitation of this flaw could potentially allow attackers to gain system privileges, although the specifics of its exploitation remain undisclosed.

The nature of the zero-day vulnerability is intriguing, as it involves a race condition—a situation where multiple processes interact in a way that can lead to unexpected behavior. Dustin Childs, head of threat awareness at Trend Micro’s Zero Day Initiative, noted that while race conditions can complicate exploitation, some are more dependable than others. He emphasized that vulnerabilities of this type often require additional exploits to fully compromise a system.

Mike Walters, president and co-founder of Action1, confirmed that a functional exploit for CVE-2025-62215 has been observed in the wild, although no public proof-of-concept has yet been released. He cautioned that while exploitation is complex, the existence of a functional exploit raises the stakes, as skilled attackers may leverage it in targeted campaigns.

Ben McCarthy, lead cyber security engineer at Immersive, elaborated on the mechanics of the race condition, explaining that an attacker with low-privilege local access could trigger it by executing a specially crafted application. This process involves manipulating multiple threads to interact unsynchronized with a shared kernel resource, ultimately confusing the kernel’s memory management.

The most critical vulnerability disclosed this month, CVE-2025-60724, is a remote-code execution flaw affecting the Microsoft Graphics Component, boasting a CVSS rating of 9.8. However, Microsoft has assessed this particular flaw as less likely to be exploited. Additionally, five other vulnerabilities have been flagged as having a higher likelihood of exploitation, including three affecting the Windows Ancillary Function Driver for WinSock, each rated at 7.0.

McCarthy pointed out that defects in the kernel-mode driver are particularly high-risk due to its integral role in Windows’ network functionality. He noted that past vulnerabilities in this driver have often been weaponized, making it a critical area of concern for security professionals.

For those interested in the full scope of vulnerabilities addressed this month, Microsoft has made the complete list available through its Security Response Center.

Winsage
Microsoft Patch Tuesday addresses 63 defects, including one actively exploited zero-day