On the second Tuesday of each month, Microsoft releases a significant security update for Windows users, known as "Patch Tuesday." In October, the update addresses over 170 security vulnerabilities, including:
- 80 elevation of privilege vulnerabilities
- 31 remote code execution vulnerabilities
- 28 information disclosure vulnerabilities
- 11 security feature bypass vulnerabilities
- 11 denial of service vulnerabilities
- 10 spoofing vulnerabilities
The total number of patches, including those for Azure, Mariner, and earlier disclosed vulnerabilities, exceeds 200. This update includes fixes for eight vulnerabilities classified as "Critical," comprising five remote code execution vulnerabilities and three elevation of privilege vulnerabilities.
Additionally, six zero-day vulnerabilities are addressed, with three publicly disclosed and three actively exploited. The exploited vulnerabilities include:
1. CVE-2025-24990: Windows Agere Modem Driver Elevation of Privilege Vulnerability
2. CVE-2025-59230: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
3. CVE-2025-47827: Secure Boot bypass in IGEL OS before version 11
The publicly disclosed vulnerabilities are:
1. CVE-2025-0033: AMD RMP Corruption During SNP Initialization
2. CVE-2025-24052: Windows Agere Modem Driver Elevation of Privilege Vulnerability
3. CVE-2025-2884: Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation
Microsoft has also ceased support for Windows 10, meaning users not enrolled in Extended Security Updates will not receive future security patches.