FREE TRIAL
Patch Tuesday

Microsoft Patch Tuesday – October 2025

11 min. read
14/10/2025
By Esben Dochy
Microsoft Patch Tuesday

⚡ TL;DR | Go Straight to the October 202Patch Tuesday Audit Report

Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The October 2025 edition of Patch Tuesday brings us 173 new fixes, with 9 rated as critical, 3 of which are actively exploited. We’ve listed the most important changes below.

Windows Agere Modem Driver Elevation of Privilege Vulnerability

CVE-2025-24990 is an elevation of privilege vulnerability that has been actively exploited. The vulnerability is in the Agere modem driver (ltmdm64.sys) that shipped with supported Windows releases, the driver has been removed in the October cumulative update after evidence of active exploitation. An attacker who successfully leverages this flaw can obtain local administrator privileges, and critically, the vulnerability can be abused even when the fax modem isn’t actively in use. Because the driver has been removed, any fax-modem hardware relying on ltmdm64.sys will stop working on updated systems.

Microsoft therefore strongly recommends removing dependencies on that hardware and applying the October cumulative update immediately. If your environment still needs fax capabilities, plan to migrate to supported hardware or software alternatives and treat affected systems as high priority for patching and investigation.

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

CVE-2025-59230 is a privilege escalation vulnerability in the Windows Remote Access Connection Manager service caused by improper access control. This flaw allows a locally authenticated attacker to elevate their privileges to SYSTEM level, effectively gaining the highest permissions available on the machine. The issue has been actively exploited in the wild, even though it has not been publicly disclosed.

Because it requires only local access, an attacker who already has a foothold on a system (through phishing, malware, or another exploit) can use this vulnerability to take full control, execute arbitrary code with elevated rights, install persistent backdoors, or disable security controls.

Secure Boot bypass in IGEL OS before 11

In IGEL OS versions before 11, a flaw in the igel-flash-driver module incorrectly verifies cryptographic signatures for SquashFS images, allowing an attacker to present a crafted (malicious) SquashFS that the system accepts and mounts as the root filesystem. Because this bypasses the intended signature checks, it effectively defeats Secure Boot on affected devices: an attacker who can supply or plant such an image can boot or persist arbitrary, unsigned system code with full control of the device. The issue was assigned CVE-2025-47827 by MITRE on IGEL’s behalf, has been observed in exploitation, and has been addressed in updated IGEL OS builds (the fixes are also incorporated into related Windows update advisories).

Windows systems need an update for this vulnerability because Microsoft’s Secure Boot infrastructure trusted the vulnerable IGEL component that was signed through its UEFI Certificate Authority. Secure Boot relies on Microsoft’s global trust chain to decide which bootloaders and drivers are safe to run, and the flawed IGEL module could be exploited to bypass that protection, even on Windows devices. To close this loophole, Microsoft issued a Windows update that adds the IGEL component’s signature to the Secure Boot revocation list (DBX), ensuring affected binaries can no longer load during boot. This update effectively restores the integrity of Secure Boot across all Windows systems, even those that never used IGEL OS.

Run the Patch Tuesday October 2025 Audit

To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!

Patch Tuesday October 2025 CVE Codes & Titles

CVE NumberCVE Title
CVE-2025-59502Remote Procedure Call Denial of Service Vulnerability
CVE-2025-59497Microsoft Defender for Linux Denial of Service Vulnerability
CVE-2025-59494Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2025-59295Windows URL Parsing Remote Code Execution Vulnerability
CVE-2025-59294Windows Taskbar Live Preview Information Disclosure Vulnerability
CVE-2025-59292Azure Compute Gallery Elevation of Privilege Vulnerability
CVE-2025-59291Confidential Azure Container Instances Elevation of Privilege Vulnerability
CVE-2025-59290Windows Bluetooth Service Elevation of Privilege Vulnerability
CVE-2025-59289Windows Bluetooth Service Elevation of Privilege Vulnerability
CVE-2025-59288Playwright Spoofing Vulnerability
CVE-2025-59287Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVE-2025-59285Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2025-59284Windows NTLM Spoofing Vulnerability
CVE-2025-59282Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-59281Xbox Gaming Services Elevation of Privilege Vulnerability
CVE-2025-59280Windows SMB Client Tampering Vulnerability
CVE-2025-59278Windows Authentication Elevation of Privilege Vulnerability
CVE-2025-59277Windows Authentication Elevation of Privilege Vulnerability
CVE-2025-59275Windows Authentication Elevation of Privilege Vulnerability
CVE-2025-59261Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2025-59260Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability
CVE-2025-59259Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVE-2025-59258Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability
CVE-2025-59257Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVE-2025-59255Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-59254Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-59253Windows Search Service Denial of Service Vulnerability
CVE-2025-59250JDBC Driver for SQL Server Spoofing Vulnerability
CVE-2025-59249Microsoft Exchange Server Elevation of Privilege Vulnerability
CVE-2025-59248Microsoft Exchange Server Spoofing Vulnerability
CVE-2025-59244NTLM Hash Disclosure Spoofing Vulnerability
CVE-2025-59243Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-59242Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-59241Windows Health and Optimized Experiences Elevation of Privilege Vulnerability
CVE-2025-59238Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2025-59237Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2025-59236Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-59235Microsoft Excel Information Disclosure Vulnerability
CVE-2025-59234Microsoft Office Remote Code Execution Vulnerability
CVE-2025-59233Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-59232Microsoft Excel Information Disclosure Vulnerability
CVE-2025-59231Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-59230Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-59229Microsoft Office Denial of Service Vulnerability
CVE-2025-59228Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2025-59227Microsoft Office Remote Code Execution Vulnerability
CVE-2025-59226Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2025-59225Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-59224Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-59223Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-59222Microsoft Word Remote Code Execution Vulnerability
CVE-2025-59221Microsoft Word Remote Code Execution Vulnerability
CVE-2025-59214Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2025-59213Configuration Manager Elevation of Privilege Vulnerability
CVE-2025-59211Windows Push Notification Information Disclosure Vulnerability
CVE-2025-59210Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVE-2025-59209Windows Push Notification Information Disclosure Vulnerability
CVE-2025-59208Windows MapUrlToZone Information Disclosure Vulnerability
CVE-2025-59207Windows Kernel Elevation of Privilege Vulnerability
CVE-2025-59206Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVE-2025-59205Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2025-59204Windows Management Services Information Disclosure Vulnerability
CVE-2025-59203Windows State Repository API Server File Information Disclosure Vulnerability
CVE-2025-59202Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVE-2025-59201Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability
CVE-2025-59200Data Sharing Service Spoofing Vulnerability
CVE-2025-59199Software Protection Platform (SPP) Elevation of Privilege Vulnerability
CVE-2025-59198Windows Search Service Denial of Service Vulnerability
CVE-2025-59197Windows ETL Channel Information Disclosure Vulnerability
CVE-2025-59196Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVE-2025-59195Microsoft Graphics Component Denial of Service Vulnerability
CVE-2025-59194Windows Kernel Elevation of Privilege Vulnerability
CVE-2025-59193Windows Management Services Elevation of Privilege Vulnerability
CVE-2025-59192Storport.sys Driver Elevation of Privilege Vulnerability
CVE-2025-59191Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2025-59190Windows Search Service Denial of Service Vulnerability
CVE-2025-59189Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-59188Microsoft Failover Cluster Information Disclosure Vulnerability
CVE-2025-59187Windows Kernel Elevation of Privilege Vulnerability
CVE-2025-59186Windows Kernel Information Disclosure Vulnerability
CVE-2025-59185NTLM Hash Disclosure Spoofing Vulnerability
CVE-2025-59184Storage Spaces Direct Information Disclosure Vulnerability
CVE-2025-58739Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2025-58738Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-58737Remote Desktop Protocol Remote Code Execution Vulnerability
CVE-2025-58736Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-58735Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-58734Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-58733Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-58732Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-58731Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-58730Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVE-2025-58729Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVE-2025-58728Windows Bluetooth Service Elevation of Privilege Vulnerability
CVE-2025-58727Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2025-58726Windows SMB Server Elevation of Privilege Vulnerability
CVE-2025-58725Windows COM+ Event System Service Elevation of Privilege Vulnerability
CVE-2025-58724Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2025-58722Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-58720Windows Cryptographic Services Information Disclosure Vulnerability
CVE-2025-58719Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2025-58718Remote Desktop Client Remote Code Execution Vulnerability
CVE-2025-58717Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-58716Windows Speech Runtime Elevation of Privilege Vulnerability
CVE-2025-58715Windows Speech Runtime Elevation of Privilege Vulnerability
CVE-2025-58714Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-55701Windows Authentication Elevation of Privilege Vulnerability
CVE-2025-55700Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-55699Windows Kernel Information Disclosure Vulnerability
CVE-2025-55698DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-55697Azure Local Elevation of Privilege Vulnerability
CVE-2025-55696NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability
CVE-2025-55695Windows WLAN AutoConfig Service Information Disclosure Vulnerability
CVE-2025-55694Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2025-55693Windows Kernel Elevation of Privilege Vulnerability
CVE-2025-55692Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2025-55691Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-55690Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-55689Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-55688Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-55687Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2025-55686Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-55685Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-55684Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-55683Windows Kernel Information Disclosure Vulnerability
CVE-2025-55682Windows BitLocker Security Feature Bypass Vulnerability
CVE-2025-55681Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2025-55680Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-55679Windows Kernel Information Disclosure Vulnerability
CVE-2025-55678DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-55677Windows Device Association Broker Service Elevation of Privilege Vulnerability
CVE-2025-55676Windows USB Video Class System Driver Information Disclosure Vulnerability
CVE-2025-55340Windows Remote Desktop Protocol Security Feature Bypass
CVE-2025-55339Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability
CVE-2025-55338Windows BitLocker Security Feature Bypass Vulnerability
CVE-2025-55337Windows BitLocker Security Feature Bypass Vulnerability
CVE-2025-55336Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CVE-2025-55335Windows NTFS Elevation of Privilege Vulnerability
CVE-2025-55334Windows Kernel Security Feature Bypass Vulnerability
CVE-2025-55333Windows BitLocker Security Feature Bypass Vulnerability
CVE-2025-55332Windows BitLocker Security Feature Bypass Vulnerability
CVE-2025-55331Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2025-55330Windows BitLocker Security Feature Bypass Vulnerability
CVE-2025-55328Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2025-55326Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability
CVE-2025-55325Windows Storage Management Provider Information Disclosure Vulnerability
CVE-2025-55320Configuration Manager Elevation of Privilege Vulnerability
CVE-2025-55315ASP.NET Security Feature Bypass Vulnerability
CVE-2025-55248.NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability
CVE-2025-55247.NET Elevation of Privilege Vulnerability
CVE-2025-55240Visual Studio Elevation of Privilege Vulnerability
CVE-2025-54957MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder
CVE-2025-54132GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool
CVE-2025-53782Microsoft Exchange Server Elevation of Privilege Vulnerability
CVE-2025-53768Xbox IStorageService Elevation of Privilege Vulnerability
CVE-2025-53717Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVE-2025-53150Windows Digital Media Elevation of Privilege Vulnerability
CVE-2025-53139Windows Hello Security Feature Bypass Vulnerability
CVE-2025-50175Windows Digital Media Elevation of Privilege Vulnerability
CVE-2025-50174Windows Device Association Broker Service Elevation of Privilege Vulnerability
CVE-2025-50152Windows Kernel Elevation of Privilege Vulnerability
CVE-2025-49708Microsoft Graphics Component Elevation of Privilege Vulnerability
CVE-2025-48813Virtual Secure Mode Spoofing Vulnerability
CVE-2025-48004Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-47989Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2025-47979Microsoft Failover Cluster Information Disclosure Vulnerability
CVE-2025-47827MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11
CVE-2025-2884Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation
CVE-2025-25004PowerShell Elevation of Privilege Vulnerability
CVE-2025-24990Windows Agere Modem Driver Elevation of Privilege Vulnerability
CVE-2025-24052Windows Agere Modem Driver Elevation of Privilege Vulnerability
CVE-2025-0033AMD CVE-2025-0033: RMP Corruption During SNP Initialization
CVE-2016-9535MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability
NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.