At this time is Microsoft’s November 2025 Patch Tuesday, which incorporates security updates for 63 flaws, together with one actively exploited zero-day vulnerability.
This Patch Tuesday additionally addresses 4 “Essential” vulnerabilities, two of that are distant code execution vulnerabilities, one is an elevation of privileges, and the fourth is an info disclosure flaw.
The variety of bugs in every vulnerability class is listed under:
- 29 Elevation of Privilege Vulnerabilities
- 2 Safety Function Bypass Vulnerabilities
- 16 Distant Code Execution Vulnerabilities
- 11 Info Disclosure Vulnerabilities
- 3 Denial of Service Vulnerabilities
- 2 Spoofing Vulnerabilities
When BleepingComputer experiences on the Patch Tuesday security updates, we solely depend these launched at this time by Microsoft. Due to this fact, the variety of flaws doesn’t embrace Microsoft Edge and Mariner vulnerabilities mounted earlier this month.
At this time can also be the primary prolonged security replace (ESU) for Home windows 10, so if you’re nonetheless using the unsupported working system, it’s strongly suggested that you simply improve to Home windows 11 or enroll within the ESU program.
For individuals who are having points enrolling in this system, Microsoft launched an out-of-band replace at this time to repair an bug that stops enrollments.
To study extra in regards to the non-security updates launched at this time, you’ll be able to assessment our devoted articles on the Home windows 11 KB5066835 and KB5066793 updates and the Home windows 10 KB5068781 prolonged security replace.
When you’re dealing with delays, blind spots, or prioritization points with Patch Tuesday updates, be a part of our December 2 webinar with Action1 to find out how trendy patch administration helps you patch sooner and scale back threat.
1 actively exploited zero-day
This month’s Patch Tuesday fixes one actively exploited zero-day flaw within the Home windows Kernel.
Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited whereas no official repair is on the market.
The exploited zero-days is:
CVE-2025-62215 – Home windows Kernel Elevation of Privilege Vulnerability
Microsoft has patched a Home windows Kernel flaw that was exploited to realize SYSTEM privilges on Home windows units.
“Concurrent execution utilizing shared useful resource with improper synchronization (‘race situation’) in Home windows Kernel permits a licensed attacker to raise privileges domestically,” explains Microsoft.
Microsoft says that the flaw requires an attackers to win a race situation, upon which they obtain SYSTEM privileges.
Microsoft has attributed the flaw to Microsoft Menace Intelligence Middle (MSTIC) & Microsoft Safety Response Middle (MSRC) however has not shared how the flaw was exploited.
Latest updates from different firms
Different distributors who launched updates or advisories in November 2025 embrace:
- Adobe launched security updates for InDesign, InCopy, PhotoShop, Illustrator, Substance 3D, Move, and Adobe Format.
- Cisco launched patches for a number of merchandise, together with Cisco ASA, Unified Contact Middle, and Identification providers. Cisco additionally warned this month {that a} new assault was found exploiting older flaws.
- expr-eval builders launched patches to repair a crucial RCE within the JavaScript library.
- Fortinet launched a security replace for a medium-severity elevation of privileges flaw in FortiOS.
- Google has launched the Android’s November security bulletin with fixes for 2 vulnerabilities.
- Ivanti launched security patches as a part of its November 2025 Patch Tuesday updates.
- runC security updates repair flaws permitting attackers to flee Docker and Kubernetes containers.
- QNAP launched security updates for seven zero-day vulnerabilities exploited to hack network-attached storage (NAS) units through the Pwn2Own Eire 2025 hacking contest.
- SAP launched the November security updates for a number of merchandise, together with a repair for a ten/10 harcoded credentials flaw in SQL Anyplace Monitor.
- Samsung launched its November security updates with fixes for 25 flaws.
The November 2025 Patch Tuesday Safety Updates
Under is the entire listing of resolved vulnerabilities within the November 2025 Patch Tuesday updates.
To entry the total description of every vulnerability and the methods it impacts, you’ll be able to view the full report right here.
| Tag | CVE ID | CVE Title | Severity |
|---|---|---|---|
| Azure Monitor Agent | CVE-2025-59504 | Azure Monitor Agent Distant Code Execution Vulnerability | Essential |
| Buyer Expertise Enchancment Program (CEIP) | CVE-2025-59512 | Buyer Expertise Enchancment Program (CEIP) Elevation of Privilege Vulnerability | Essential |
| Dynamics 365 Area Service (on-line) | CVE-2025-62211 | Dynamics 365 Area Service (on-line) Spoofing Vulnerability | Essential |
| Dynamics 365 Area Service (on-line) | CVE-2025-62210 | Dynamics 365 Area Service (on-line) Spoofing Vulnerability | Essential |
| GitHub Copilot and Visible Studio Code | CVE-2025-62453 | GitHub Copilot and Visible Studio Code Safety Function Bypass Vulnerability | Essential |
| Host Course of for Home windows Duties | CVE-2025-60710 | Host Course of for Home windows Duties Elevation of Privilege Vulnerability | Essential |
| Microsoft Configuration Supervisor | CVE-2025-47179 | Configuration Supervisor Elevation of Privilege Vulnerability | Essential |
| Microsoft Dynamics 365 (on-premises) | CVE-2025-62206 | Microsoft Dynamics 365 (On-Premises) Info Disclosure Vulnerability | Essential |
| Microsoft Graphics Part | CVE-2025-60724 | GDI+ Distant Code Execution Vulnerability | Essential |
| Microsoft Workplace | CVE-2025-62216 | Microsoft Workplace Distant Code Execution Vulnerability | Essential |
| Microsoft Workplace | CVE-2025-62199 | Microsoft Workplace Distant Code Execution Vulnerability | Essential |
| Microsoft Workplace Excel | CVE-2025-62200 | Microsoft Excel Distant Code Execution Vulnerability | Essential |
| Microsoft Workplace Excel | CVE-2025-62201 | Microsoft Excel Distant Code Execution Vulnerability | Essential |
| Microsoft Workplace Excel | CVE-2025-60726 | Microsoft Excel Info Disclosure Vulnerability | Essential |
| Microsoft Workplace Excel | CVE-2025-62203 | Microsoft Excel Distant Code Execution Vulnerability | Essential |
| Microsoft Workplace Excel | CVE-2025-62202 | Microsoft Excel Info Disclosure Vulnerability | Essential |
| Microsoft Workplace Excel | CVE-2025-60727 | Microsoft Excel Distant Code Execution Vulnerability | Essential |
| Microsoft Workplace Excel | CVE-2025-60728 | Microsoft Excel Info Disclosure Vulnerability | Essential |
| Microsoft Workplace Excel | CVE-2025-59240 | Microsoft Excel Info Disclosure Vulnerability | Essential |
| Microsoft Workplace SharePoint | CVE-2025-62204 | Microsoft SharePoint Distant Code Execution Vulnerability | Essential |
| Microsoft Workplace Phrase | CVE-2025-62205 | Microsoft Workplace Distant Code Execution Vulnerability | Essential |
| Microsoft Streaming Service | CVE-2025-59514 | Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability | Essential |
| Microsoft Wi-fi Provisioning System | CVE-2025-62218 | Microsoft Wi-fi Provisioning System Elevation of Privilege Vulnerability | Essential |
| Microsoft Wi-fi Provisioning System | CVE-2025-62219 | Microsoft Wi-fi Provisioning System Elevation of Privilege Vulnerability | Essential |
| Multimedia Class Scheduler Service (MMCSS) | CVE-2025-60707 | Multimedia Class Scheduler Service (MMCSS) Driver Elevation of Privilege Vulnerability | Essential |
| Nuance PowerScribe | CVE-2025-30398 | Nuance PowerScribe 360 Info Disclosure Vulnerability | Essential |
| OneDrive for Android | CVE-2025-60722 | Microsoft OneDrive for Android Elevation of Privilege Vulnerability | Essential |
| Position: Home windows Hyper-V | CVE-2025-60706 | Home windows Hyper-V Info Disclosure Vulnerability | Essential |
| SQL Server | CVE-2025-59499 | Microsoft SQL Server Elevation of Privilege Vulnerability | Essential |
| Storvsp.sys Driver | CVE-2025-60708 | Storvsp.sys Driver Denial of Service Vulnerability | Essential |
| Visible Studio | CVE-2025-62214 | Visible Studio Distant Code Execution Vulnerability | Essential |
| Visible Studio Code CoPilot Chat Extension | CVE-2025-62449 | Microsoft Visible Studio Code CoPilot Chat Extension Safety Function Bypass Vulnerability | Essential |
| Visible Studio Code CoPilot Chat Extension | CVE-2025-62222 | Agentic AI and Visible Studio Code Distant Code Execution Vulnerability | Essential |
| Home windows Administrator Safety | CVE-2025-60721 | Home windows Administrator Safety Elevation of Privilege Vulnerability | Essential |
| Home windows Administrator Safety | CVE-2025-60718 | Home windows Administrator Safety Elevation of Privilege Vulnerability | Essential |
| Home windows Ancillary Operate Driver for WinSock | CVE-2025-62217 | Home windows Ancillary Operate Driver for WinSock Elevation of Privilege Vulnerability | Essential |
| Home windows Ancillary Operate Driver for WinSock | CVE-2025-60719 | Home windows Ancillary Operate Driver for WinSock Elevation of Privilege Vulnerability | Essential |
| Home windows Ancillary Operate Driver for WinSock | CVE-2025-62213 | Home windows Ancillary Operate Driver for WinSock Elevation of Privilege Vulnerability | Essential |
| Home windows Bluetooth RFCOM Protocol Driver | CVE-2025-59513 | Home windows Bluetooth RFCOM Protocol Driver Info Disclosure Vulnerability | Essential |
| Home windows Broadcast DVR Consumer Service | CVE-2025-59515 | Home windows Broadcast DVR Consumer Service Elevation of Privilege Vulnerability | Essential |
| Home windows Broadcast DVR Consumer Service | CVE-2025-60717 | Home windows Broadcast DVR Consumer Service Elevation of Privilege Vulnerability | Essential |
| Home windows Shopper-Aspect Caching (CSC) Service | CVE-2025-60705 | Home windows Shopper-Aspect Caching Elevation of Privilege Vulnerability | Essential |
| Home windows Frequent Log File System Driver | CVE-2025-60709 | Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability | Essential |
| Home windows DirectX | CVE-2025-59506 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | Essential |
| Home windows DirectX | CVE-2025-60716 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | Essential |
| Home windows DirectX | CVE-2025-60723 | DirectX Graphics Kernel Denial of Service Vulnerability | Essential |
| Home windows Kerberos | CVE-2025-60704 | Home windows Kerberos Elevation of Privilege Vulnerability | Essential |
| Home windows Kernel | CVE-2025-62215 | Home windows Kernel Elevation of Privilege Vulnerability | Essential |
| Home windows License Supervisor | CVE-2025-62208 | Home windows License Supervisor Info Disclosure Vulnerability | Essential |
| Home windows License Supervisor | CVE-2025-62209 | Home windows License Supervisor Info Disclosure Vulnerability | Essential |
| Home windows OLE | CVE-2025-60714 | Home windows OLE Distant Code Execution Vulnerability | Essential |
| Home windows Distant Desktop | CVE-2025-60703 | Home windows Distant Desktop Providers Elevation of Privilege Vulnerability | Essential |
| Home windows Routing and Distant Entry Service (RRAS) | CVE-2025-62452 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
| Home windows Routing and Distant Entry Service (RRAS) | CVE-2025-59510 | Home windows Routing and Distant Entry Service (RRAS) Denial of Service Vulnerability | Essential |
| Home windows Routing and Distant Entry Service (RRAS) | CVE-2025-60715 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
| Home windows Routing and Distant Entry Service (RRAS) | CVE-2025-60713 | Home windows Routing and Distant Entry Service (RRAS) Elevation of Privilege Vulnerability | Essential |
| Home windows Sensible Card | CVE-2025-59505 | Home windows Sensible Card Reader Elevation of Privilege Vulnerability | Essential |
| Home windows Speech | CVE-2025-59507 | Home windows Speech Runtime Elevation of Privilege Vulnerability | Essential |
| Home windows Speech | CVE-2025-59508 | Home windows Speech Recognition Elevation of Privilege Vulnerability | Essential |
| Home windows Speech | CVE-2025-59509 | Home windows Speech Recognition Info Disclosure Vulnerability | Essential |
| Home windows Subsystem for Linux GUI | CVE-2025-62220 | Home windows Subsystem for Linux GUI Distant Code Execution Vulnerability | Essential |
| Home windows TDX.sys | CVE-2025-60720 | Home windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability | Essential |
| Home windows WLAN Service | CVE-2025-59511 | Home windows WLAN Service Elevation of Privilege Vulnerability | Essential |

Whether or not you are cleansing up previous keys or setting guardrails for AI-generated code, this information helps your group construct securely from the beginning.
Get the cheat sheet and take the guesswork out of secrets and techniques administration.



