2025年10月15日星期三

Microsoft Monthly Security Update (October 2025)

Microsoft Monthly Security Update (October 2025)

Release Date: 15 Oct 2025

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

Microsoft has released monthly security update for their products:

 

Vulnerable ProductRisk LevelImpactsNotes
AzureMedium Risk Medium RiskElevation of Privilege
Remote Code Execution
Spoofing
 
WindowsMedium Risk Medium RiskElevation of Privilege
Information Disclosure
Security Restriction Bypass
Remote Code Execution
Spoofing
Denial of Service
Data Manipulation

CVE-2025-59230 is being exploited in the wild. Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

 

CVE-2025-24990 is being exploited in the wild. Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.

 

Proof of Concept exploit code is publicly available for CVE-2025-24052 . Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.

 

CVE-2025-47827 is being exploited in the wild. In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.

Server SoftwareMedium Risk Medium RiskElevation of Privilege
Spoofing
 
Developer ToolsMedium Risk Medium RiskElevation of Privilege
Information Disclosure
Security Restriction Bypass
 
Extended Security Updates (ESU)Medium Risk Medium RiskElevation of Privilege
Information Disclosure
Remote Code Execution
Spoofing
Denial of Service
Data Manipulation
Security Restriction Bypass

CVE-2025-59230 is being exploited in the wild. Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

 

CVE-2025-24990 is being exploited in the wild. Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.

 

Proof of Concept exploit code is publicly available for CVE-2025-24052 . Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.

 

CVE-2025-47827 is being exploited in the wild. In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.

System CenterMedium Risk Medium RiskElevation of Privilege
Denial of Service
 
Microsoft OfficeMedium Risk Medium RiskRemote Code Execution
Information Disclosure
Denial of Service
 
SQL ServerLow Risk Low RiskSpoofing 
AppsMedium Risk Medium RiskElevation of Privilege
Spoofing
 
Open Source SoftwareLow Risk Low RiskSpoofing 

 

Number of 'Extremely High Risk' product(s): 0

Number of 'High Risk' product(s): 0

Number of 'Medium Risk' product(s): 8

Number of 'Low Risk' product(s): 2

Evaluation of overall 'Risk Level': Medium Risk


Impact

  • Remote Code Execution
  • Denial of Service
  • Data Manipulation
  • Information Disclosure
  • Security Restriction Bypass
  • Elevation of Privilege
  • Spoofing

System / Technologies affected

  • Azure
  • Windows
  • Server Software
  • Developer Tools
  • Extended Security Updates (ESU)
  • System Center
  • Microsoft Office
  • SQL Server
  • Apps
  • Open Source Software

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  •  Apply fixes issued by the vendor.

Vulnerability Identifier


Source


Related Link

    沒有留言:

    發佈留言

    WatchGuard Fireware 遠端執行程式碼漏洞

    WatchGuard Fireware 遠端執行程式碼漏洞 發佈日期: 2025年12月22日 風險: 極高度風險 類型: 伺服器 - 其他伺服...