Microsoft right now pushed updates to repair no less than 56 safety flaws in its Home windows working techniques and supported software program. This remaining Patch Tuesday of 2025 tackles one zero-day bug that’s already being exploited, in addition to two publicly disclosed vulnerabilities.

Regardless of releasing a lower-than-normal variety of safety updates these previous few months, Microsoft patched a whopping 1,129 vulnerabilities in 2025, an 11.9% enhance from 2024. In response to Satnam Narang at Tenable, this 12 months marks the second consecutive 12 months that Microsoft patched over one thousand vulnerabilities, and the third time it has achieved so since its inception.
The zero-day flaw patched right now is CVE-2025-62221, a privilege escalation vulnerability affecting Home windows 10 and later editions. The weak spot resides in a element known as the “Home windows Cloud Information Mini Filter Driver” — a system driver that permits cloud purposes to entry file system functionalities.
“That is notably regarding, because the mini filter is integral to companies like OneDrive, Google Drive, and iCloud, and stays a core Home windows element, even when none of these apps had been put in,” stated Adam Barnett, lead software program engineer at Rapid7.
Solely three of the issues patched right now earned Microsoft’s most-dire “essential” score: Each CVE-2025-62554 and CVE-2025-62557 contain Microsoft Workplace, and each can exploited merely by viewing a booby-trapped electronic mail message within the Preview Pane. One other essential bug — CVE-2025-62562 — includes Microsoft Outlook, though Redmond says the Preview Pane shouldn’t be an assault vector with this one.
However based on Microsoft, the vulnerabilities most certainly to be exploited from this month’s patch batch are different (non-critical) privilege escalation bugs, together with:
–CVE-2025-62458 — Win32k
–CVE-2025-62470 — Home windows Frequent Log File System Driver
–CVE-2025-62472 — Home windows Distant Entry Connection Supervisor
–CVE-2025-59516 — Home windows Storage VSP Driver
–CVE-2025-59517 — Home windows Storage VSP Driver
Kev Breen, senior director of menace analysis at Immersive, stated privilege escalation flaws are noticed in nearly each incident involving host compromises.
“We don’t know why Microsoft has marked these particularly as extra probably, however the majority of those elements have traditionally been exploited within the wild or have sufficient technical element on earlier CVEs that it will be simpler for menace actors to weaponize these,” Breen stated. “Both means, whereas not actively being exploited, these ought to be patched sooner moderately than later.”
One of many extra fascinating vulnerabilities patched this month is CVE-2025-64671, a distant code execution flaw within the Github Copilot Plugin for Jetbrains AI-based coding assistant that’s utilized by Microsoft and GitHub. Breen stated this flaw would enable attackers to execute arbitrary code by tricking the big language mannequin (LLM) into operating instructions that bypass the guardrails and add malicious directions within the consumer’s “auto-approve” settings.
CVE-2025-64671 is a part of a broader, extra systemic safety disaster that safety researcher Ari Marzuk has branded IDEsaster (IDE stands for “built-in growth surroundings”), which encompasses greater than 30 separate vulnerabilities reported in almost a dozen market-leading AI coding platforms, together with Cursor, Windsurf, Gemini CLI, and Claude Code.
The opposite publicly-disclosed vulnerability patched right now is CVE-2025-54100, a distant code execution bug in Home windows Powershell on Home windows Server 2008 and later that permits an unauthenticated attacker to run code within the safety context of the consumer.
For anybody in search of a extra granular breakdown of the safety updates Microsoft pushed right now, try the roundup on the SANS Web Storm Heart. As at all times, please go away a notice within the feedback for those who expertise issues making use of any of this month’s Home windows patches.