20.3 C
New York
Tuesday, October 7, 2025

Microsoft Patch Tuesday, September 2025 Version – Krebs on Safety


Microsoft Corp. at the moment issued safety updates to repair greater than 80 vulnerabilities in its Home windows working methods and software program. There aren’t any recognized “zero-day” or actively exploited vulnerabilities on this month’s bundle from Redmond, which however consists of patches for 13 flaws that earned Microsoft’s most-dire “important” label. In the meantime, each Apple and Google not too long ago launched updates to repair zero-day bugs of their gadgets.

Microsoft Patch Tuesday, September 2025 Version – Krebs on Safety

Microsoft assigns safety flaws a “important” score when malware or miscreants can exploit them to realize distant entry to a Home windows system with little or no assist from customers. Among the many extra regarding important bugs quashed this month is CVE-2025-54918. The issue right here resides with Home windows NTLM, or NT LAN Supervisor, a collection of code for managing authentication in a Home windows community setting.

Redmond charges this flaw as “Exploitation Extra Doubtless,” and though it’s listed as a privilege escalation vulnerability, Kev Breen at Immersive says this one is definitely exploitable over the community or the Web.

“From Microsoft’s restricted description, it seems that if an attacker is ready to ship specifically crafted packets over the community to the goal gadget, they might have the power to realize SYSTEM-level privileges on the goal machine,” Breen mentioned. “The patch notes for this vulnerability state that ‘Improper authentication in Home windows NTLM permits a certified attacker to raise privileges over a community,’ suggesting an attacker might already must have entry to the NTLM hash or the consumer’s credentials.”

Breen mentioned one other patch — CVE-2025-55234, a 8.8 CVSS-scored flaw affecting the Home windows SMB shopper for sharing information throughout a community — is also listed as privilege escalation bug however is likewise remotely exploitable. This vulnerability was publicly disclosed previous to this month.

“Microsoft says that an attacker with community entry would have the ability to carry out a replay assault in opposition to a goal host, which may outcome within the attacker gaining further privileges, which may result in code execution,” Breen famous.

CVE-2025-54916 is an “necessary” vulnerability in Home windows NTFS — the default filesystem for all trendy variations of Home windows — that may result in distant code execution. Microsoft likewise thinks we’re greater than prone to see exploitation of this bug quickly: The final time Microsoft patched an NTFS bug was in March 2025 and it was already being exploited within the wild as a zero-day.

“Whereas the title of the CVE says ‘Distant Code Execution,’ this exploit will not be remotely exploitable over the community, however as a substitute wants an attacker to both have the power to run code on the host or to persuade a consumer to run a file that will set off the exploit,” Breen mentioned. “That is generally seen in social engineering assaults, the place they ship the consumer a file to open as an attachment or a hyperlink to a file to obtain and run.”

Vital and distant code execution bugs are likely to steal all of the limelight, however Tenable Senior Employees Analysis Engineer Satnam Narang notes that just about half of all vulnerabilities mounted by Microsoft this month are privilege escalation flaws that require an attacker to have gained entry to a goal system first earlier than trying to raise privileges.

“For the third time this yr, Microsoft patched extra elevation of privilege vulnerabilities than distant code execution flaws,” Narang noticed.

On Sept. 3, Google mounted two flaws that had been detected as exploited in zero-day assaults, together with CVE-2025-38352, an elevation of privilege within the Android kernel, and CVE-2025-48543, additionally an elevation of privilege downside within the Android Runtime part.

Additionally, Apple not too long ago patched its seventh zero-day (CVE-2025-43300) of this yr. It was a part of an exploit chain used together with a vulnerability within the WhatsApp (CVE-2025-55177) on the spot messenger to hack Apple gadgets. Amnesty Worldwide studies that the 2 zero-days have been utilized in “a sophisticated spy ware marketing campaign” over the previous 90 days. The problem is mounted in iOS 18.6.2, iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, and macOS Ventura 13.7.8.

The SANS Web Storm Heart has a clickable breakdown of every particular person repair from Microsoft, listed by severity and CVSS rating. Enterprise Home windows admins concerned in testing patches earlier than rolling them out ought to keep watch over askwoody.com, which frequently has the thin on wonky updates.

AskWoody additionally reminds us that we’re now simply two months out from Microsoft discontinuing free safety updates for Home windows 10 computer systems. For these serious about safely extending the lifespan and usefulness of those older machines, try final month’s Patch Tuesday protection for just a few pointers.

As ever, please don’t neglect to again up your knowledge (if not your whole system) at common intervals, and be happy to hold forth within the feedback when you expertise issues putting in any of those fixes.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles