Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2025-Oct
Reports indicated that the vulnerabilities (CVE-2025-24990, CVE-2025-47827 and CVE-2025-59230) in Microsoft products are being exploited in the wild. In addition, the proof-of-concept (PoC) exploit code for the elevation of privilege vulnerability (CVE-2025-24052) in Microsoft Agere Windows Modem Driver are publicly available. Microsoft has released security updates to address the issues. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 10, 11
- Microsoft Windows App Client
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022, 2022, 23H2 Edition, 2025
- Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, LTSC for Mac 2021, LTSC for Mac 2024,
- Microsoft Office for Android
- Microsoft Excel 2016
- Microsoft Word 2016
- Microsoft PowerPoint 2016
- Microsoft 365 Apps for Enterprise
- Microsoft Exchange Server 2016, 2019, Subscription Edition RTM
- Microsoft Access 2016
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019, Subscription Edition
- Microsoft Visual Studio 2017, 2019, 2022
- .NET 8.0 installed, 8.0 installed on Linux, 8.0 installed on Mac OS, 9.0 installed, 9.0 installed on Linux, 9.0 installed on Mac OS
- ASP.NET Core 2.3, 8.0, 9.0
- Azure Compute Gallery, Monitor Agent
- Microsoft .NET Framework 2.0, 3.0, 3.5, 3.5 , 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, 4.8.1
- PowerShell 7.4, 7.5
- Remote Desktop client
- Office Online Server
Impact:
Depending on the vulnerabilities exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security restriction bypass, spoofing or tampering on an affected system.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2025-Oct
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-october-2025
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24052
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24990
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25004
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47827
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47979
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47989
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48004
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48813
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49708
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50152
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50174 (to CVE-2025-50175)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53139
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53150
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53717
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53768
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53782
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54132
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54957
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55240
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55247 (to CVE-2025-55248)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55320
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55325 (to CVE-2025-55326)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55328
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55330 (to CVE-2025-55340)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55676 (to CVE-2025-55701)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58714 (to CVE-2025-58720)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58722
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58724 (to CVE-2025-58739)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59184 (to CVE-2025-59211)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59213 (to CVE-2025-59214)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59221 (to CVE-2025-59238)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59241 (to CVE-2025-59244)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59248 (to CVE-2025-59250)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59253 (to CVE-2025-59254)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59257 (to CVE-2025-59261)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59275
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59277 (to CVE-2025-59278)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59280 (to CVE-2025-59282)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59284 (to CVE-2025-59285)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59287 (to CVE-2025-59292)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59294 (to CVE-2025-59295)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59494
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59497
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59502