• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

A giant end to 2025 in December’s Patch Tuesday – Sophos Information

Admin by Admin
December 13, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Microsoft on Tuesday launched 56 patches affecting 10 product households. Two of the addressed points are thought of by Microsoft to be of Crucial severity – and, unusually, each belong to the blended Workplace-365 product household. Eight have a CVSS base rating of 8.0 or greater. One is understood to be beneath energetic exploit within the wild, and two others are publicly disclosed.

That’s the excellent news. We’ll get to the advisories in a second.

At patch time, six CVEs are judged extra more likely to be exploited within the subsequent 30 days by the corporate’s estimation, along with the one already detected to be so. Varied of this month’s points are amenable to direct detection by Sophos protections, and we embody data on these in a desk beneath.

The discharge additionally consists of data on 14 Edge patches launched final week, in addition to 12 ColdFusion and 4 Adobe Reader patches launched right now. (The only real Edge patch originating with Microsoft is counted on this complete slightly within the basic Patch Tuesday rely of 56; the remaining originated with Chromium itself and have been patched earlier within the month.) We’ve included data on all these patches in Appendix D. There is no such thing as a replace to the Servicing Stack listed in Microsoft’s manifest this month.

Microsoft additionally launched data on 84 CVEs affecting CBL Mariner and/or Azure Linux. All 84 CVEs originated with MITRE and have been addressed over the course of the previous week, and all 84 are indicated as exploited in within the wild (although none are marked as publicly disclosed). Little data was made out there on these 84 CVEs, however we’ve supplied some steering in Appendix F on the finish of the publish.

We’re as all the time together with on the finish of this publish appendices itemizing all Microsoft’s patches sorted by severity (Appendix A), by predicted exploitability timeline and CVSS Base rating (Appendix B), and by product household (Appendix C). Appendix E offers a breakout of the patches affecting the assorted Home windows Server platforms.

By the numbers

  • Complete CVEs: 56
  • Publicly disclosed: 2
  • Exploit detected: 1
  • Severity
    • Crucial: 2
    • Essential: 54
  • Impression
    • Denial of Service: 3
    • Elevation of Privilege: 28
    • Data Disclosure: 4
    • Distant Code Execution: 19
    • Spoofing: 2
  • CVSS Base rating 9.0 or better: 0
  • CVSS Base rating 8.0 or better: 8

A bar chart showing the distribution of December 2025 Patch Tuesday CVEs sorted by impact and further indicated by severity; information in text

Determine 1: Elevation of Privilege points have been probably the most quite a few within the December assortment, as soon as once more

Merchandise

  • Home windows: 38
  • 365: 13
  • Workplace: 13
  • Excel: 6
  • SharePoint: 5
  • Phrase: 4
  • Change: 2
  • Entry: 1
  • Azure: 1
  • GitHub: 1

As is our customized for this record, CVEs that apply to a couple of product household are counted as soon as for every household they have an effect on. We notice, by the best way, that CVE names don’t all the time replicate affected product households carefully. Specifically, some CVEs names within the Workplace household might point out merchandise that don’t seem within the record of merchandise affected by the CVE, and vice versa.

A bar chart showing the December Patch Tuesday CVEs sorted by affected product family and further color-coded by severity; information in text

Determine 2: A smaller, closely end-user-oriented group of product households acquired patches this month. Although Home windows accounts for half of them, patches associated to the working system are all Essential in severity

Notable December updates

Along with the problems mentioned above, a number of particular objects benefit consideration.

CVE-2025-62554 — Microsoft Workplace Distant Code Execution Vulnerability
CVE-2025-62555 — Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62557 — Microsoft Workplace Distant Code Execution Vulnerability
CVE-2025-62558 — Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62559 — Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62560 — Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62561 — Microsoft Excel Distant Code Execution Vulnerability

All seven of those RCE points have an effect on a number of variations of 365 and Workplace, together with Microsoft Workplace LTSC for Mac 2021 and 2024. Nonetheless, the patches for these Mac variations aren’t prepared but. Customers liable for updating Macs are requested to watch the CVE data for every vulnerability for additional phrase on these patches. Of the seven, pay particular consideration to CVE-2025-62554 and CVE-2025-62257 (the 2 merely referred to as “Workplace” vulnerabilities) – they’re those which Preview Pane is an assault vector. These two CVEs are Crucial-severity and have a CVSS Base rating of 8.4. The others are Essential-severity.

CVE-2025-54100 — PowerShell Distant Code Execution Vulnerability

As with the 84 Mariner vulnerabilities talked about above, the discharge of this patch arrived with much less data than Microsoft-issued CVEs typically do. That mentioned, this Essential-class subject is allotted to Home windows; as with the GitHub subject mentioned beneath, it includes improper neutralization of particular components utilized in a command. For this one, Microsoft notes that after set up, customers trying to deploy the Invoke-WebRequest command will get a brand new affirmation immediate warning them of probably undesirable script code execution and recommending that they embody the -UseBasicParsing change to maintain issues behaving properly.

CVE-2025-64666 — Microsoft Change Server Elevation of Privilege Vulnerability
CVE-2025-64667 — Microsoft Change Server Spoofing Vulnerability

These two Essential-severity bugs each have an effect on Change Server 2016 and 2019, that are out-of-support variations of Change – except you’re paying for Microsoft’s Prolonged Safety Replace (ESU) program, you’re not getting these patches. (Change Server Subscription Version subscribers are coated.) The EoP is a reasonably specialised merchandise that may require the attacker to arrange the goal setting forward of time, whereas the Spoofing bug impacts, particularly, how From: addresses are exhibited to the consumer.

CVE-2025-64671 — GitHub Copilot for Jetbrains Distant Code Execution Vulnerability

The one publicly disclosed vulnerability to date this month permits the Jetbrain AI-based coding assistant to spoil the vibe-coding vibe, because of improper neutralization of particular components utilized in a command. Based on Microsoft, an attacker may execute extra instructions by appending them to instructions allowed within the consumer’s terminal auto-approve setting. This vulnerability is credited to impartial researcher Ari Marzouk, who simply final weekend posted evaluation of a probably full of life new class of vulnerabilities in AI IDEs. An intriguing learn.

A bar chart showing cumulative Patch Tuesday counts by impact for all of 2025, further color-coded by severity. In order of decreasing occurrence, Elevation of Privilege was the most common impact type, followed by Remote Code Execution, Information Disclosure, Denial of Service, Security Feature Bypass, Spoofing, and Tampering

Determine 3: The 12 months wrapped up with Elevation of Privilege and Distant Code Execution swapping spots on the prime of the charts. Be aware, although, that despite the fact that there have been fewer RCE bugs squashed this 12 months, there was the next share of Crucial-severity RCEs. Total there have been 92 Crucial-severity CVEs deal with in 2025 in comparison with 55 final 12 months.

A bar chart showing Patch Tuesday counts for every month since January 2020

Determine 4: Behold the ultimate (one hopes) 2025 tally: In the long run, it was probably the most patch-heavy 12 months (1196 excluding out-of-band patch releases) since 2020 (1245 patches excluding out-of-bands), with two record-breaking months in January and October.

 

Sophos protections

CVE Sophos Intercept X/Endpoint IPS Sophos XGS Firewall
CVE-2025-59516 Exp/2559516-A Exp/2559516-A
CVE-2025-59517 Exp/2559517-A Exp/2559517-A
CVE-2025-62221 Exp/2562221-A Exp/2562221-A
CVE-2025-62454 Exp/2562454-A Exp/2562454-A
CVE-2025-62470 Exp/2562470-A Exp/2562470-A
CVE-2025-62472 Exp/2562472-A Exp/2562472-A

 

As you possibly can each month, in case you don’t wish to wait on your system to tug down Microsoft’s updates itself, you possibly can obtain them manually from the Home windows Replace Catalog web site. Run the winver.exe instrument to find out which construct of Home windows you’re operating, then obtain the Cumulative Replace bundle on your particular system’s structure and construct quantity.

Appendix A: Vulnerability Impression and Severity

It is a record of December patches sorted by affect, then sub-sorted by severity. Every record is additional organized by CVE.

Elevation of Privilege (28 CVEs)

Essential severity
CVE-2025-55233 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-59516 Home windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517 Home windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62221 Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62454 Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62455 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2025-62457 Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458 Win32k Elevation of Privilege Vulnerability
CVE-2025-62461 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62462 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62464 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62466 Home windows Shopper-Aspect Caching Elevation of Privilege Vulnerability
CVE-2025-62467 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62469 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-62470 Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472 Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability
CVE-2025-62474 Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability
CVE-2025-62565 Home windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-62569 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-62571 Home windows Installer Elevation of Privilege Vulnerability
CVE-2025-62572 Software Data Service Elevation of Privilege Vulnerability
CVE-2025-62573 DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-64658 Home windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-64661 Home windows Shell Elevation of Privilege Vulnerability
CVE-2025-64666 Microsoft Change Server Elevation of Privilege Vulnerability
CVE-2025-64673 Home windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-64679 Home windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-64680 Home windows DWM Core Library Elevation of Privilege Vulnerability

 

Distant Code Execution (19 CVEs)

Crucial severity
CVE-2025-62554 Microsoft Workplace Distant Code Execution Vulnerability
CVE-2025-62557 Microsoft Workplace Distant Code Execution Vulnerability
Essential severity
CVE-2025-54100 PowerShell Distant Code Execution Vulnerability
CVE-2025-62456 Home windows Resilient File System (ReFS) Distant Code Execution Vulnerability
CVE-2025-62549 Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability
CVE-2025-62550 Azure Monitor Agent Distant Code Execution Vulnerability
CVE-2025-62552 Microsoft Entry Distant Code Execution Vulnerability
CVE-2025-62553 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62555 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62556 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62558 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62559 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62560 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62561 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62562 Microsoft Outlook Distant Code Execution Vulnerability
CVE-2025-62563 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62564 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-64671 GitHub Copilot for Jetbrains Distant Code Execution Vulnerability
CVE-2025-64678 Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability

 

Data Disclosure (4 CVEs)

Essential severity
CVE-2025-62468 Home windows Defender Firewall Service Data Disclosure Vulnerability
CVE-2025-62473 Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability
CVE-2025-62570 Home windows Digicam Body Server Monitor Data Disclosure Vulnerability
CVE-2025-64670 Home windows DirectX Data Disclosure Vulnerability

 

Denial of Service (3 CVEs)

Essential severity
CVE-2025-62463 DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62465 DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62567 Home windows Hyper-V Denial of Service Vulnerability

 

Spoofing (2 CVEs)

Essential severity
CVE-2025-64667 Microsoft Change Server Spoofing Vulnerability
CVE-2025-64672 Microsoft SharePoint Server Spoofing Vulnerability

 

 

Appendix B: Exploitability and CVSS

It is a record of the December CVEs judged by Microsoft to be extra more likely to be exploited within the wild throughout the first 30 days post-release. The record is organized by CVE.

Exploitation extra doubtless throughout the subsequent 30 days
CVE-2025-59516 Home windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517 Home windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62454 Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458 Win32k Elevation of Privilege Vulnerability
CVE-2025-62470 Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472 Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability

 

The CVE listed beneath was identified to be beneath energetic exploit previous to the discharge of this month’s patches.

CVE-2025-62221 Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability

 

These are the December CVEs with a Microsoft-assessed CVSS Base rating of 8.0 or greater. They’re organized by rating and additional sorted by CVE. For extra data on how CVSS works, please see our sequence on patch prioritization schema.

CVSS Base CVSS Temporal CVE Title
8.8 7.7 CVE-2025-62456 Home windows Resilient File System (ReFS) Distant Code Execution Vulnerability
8.8 7.7 CVE-2025-62549 Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability
8.8 7.7 CVE-2025-62550 Azure Monitor Agent Distant Code Execution Vulnerability
8.8 7.7 CVE-2025-64672 Microsoft SharePoint Server Spoofing Vulnerability
8.8 7.7 CVE-2025-64678 Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability
8.4 7.3 CVE-2025-62554 Microsoft Workplace Distant Code Execution Vulnerability
8.4 7.3 CVE-2025-62557 Microsoft Workplace Distant Code Execution Vulnerability
8.4 7.3 CVE-2025-64671 GitHub Copilot for Jetbrains Distant Code Execution Vulnerability

 

Appendix C: Merchandise Affected

It is a record of December’s patches sorted by product household, then sub-sorted by severity. Every record is additional organized by CVE. Patches which are shared amongst a number of product households are listed a number of occasions, as soon as for every product household. Sure points for which advisories have been issued are coated in Appendix D, and points affecting Home windows Server are additional sorted in Appendix E. All CVE titles are correct as made out there by Microsoft; for additional data on why sure merchandise might seem in titles and never product households (or vice versa), please seek the advice of Microsoft.

Home windows (38 CVEs)

Essential severity
CVE-2025-54100 PowerShell Distant Code Execution Vulnerability
CVE-2025-55233 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-59516 Home windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517 Home windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62221 Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62454 Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62455 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2025-62456 Home windows Resilient File System (ReFS) Distant Code Execution Vulnerability
CVE-2025-62457 Home windows Cloud Recordsdata Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458 Win32k Elevation of Privilege Vulnerability
CVE-2025-62461 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62462 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62463 DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62464 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62465 DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62466 Home windows Shopper-Aspect Caching Elevation of Privilege Vulnerability
CVE-2025-62467 Home windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62468 Home windows Defender Firewall Service Data Disclosure Vulnerability
CVE-2025-62469 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-62470 Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472 Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability
CVE-2025-62473 Home windows Routing and Distant Entry Service (RRAS) Data Disclosure Vulnerability
CVE-2025-62474 Home windows Distant Entry Connection Supervisor Elevation of Privilege Vulnerability
CVE-2025-62549 Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability
CVE-2025-62565 Home windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-62567 Home windows Hyper-V Denial of Service Vulnerability
CVE-2025-62569 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-62570 Home windows Digicam Body Server Monitor Data Disclosure Vulnerability
CVE-2025-62571 Home windows Installer Elevation of Privilege Vulnerability
CVE-2025-62572 Software Data Service Elevation of Privilege Vulnerability
CVE-2025-62573 DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-64658 Home windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-64661 Home windows Shell Elevation of Privilege Vulnerability
CVE-2025-64670 Home windows DirectX Data Disclosure Vulnerability
CVE-2025-64673 Home windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-64678 Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability
CVE-2025-64679 Home windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-64680 Home windows DWM Core Library Elevation of Privilege Vulnerability

 

365 (13 CVEs)

Crucial severity
CVE-2025-62554 Microsoft Workplace Distant Code Execution Vulnerability
CVE-2025-62557 Microsoft Workplace Distant Code Execution Vulnerability
CVE-2025-62562 Microsoft Outlook Distant Code Execution Vulnerability
Essential severity
CVE-2025-62552 Microsoft Entry Distant Code Execution Vulnerability
CVE-2025-62553 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62555 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62556 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62558 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62559 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62560 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62561 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62563 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62564 Microsoft Excel Distant Code Execution Vulnerability

 

Workplace (13 CVEs)

Crucial severity
CVE-2025-62554 Microsoft Workplace Distant Code Execution Vulnerability
CVE-2025-62557 Microsoft Workplace Distant Code Execution Vulnerability
Essential severity
CVE-2025-62552 Microsoft Entry Distant Code Execution Vulnerability
CVE-2025-62553 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62555 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62556 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62558 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62559 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62560 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62561 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62562 Microsoft Outlook Distant Code Execution Vulnerability
CVE-2025-62563 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62564 Microsoft Excel Distant Code Execution Vulnerability

 

Excel (6 CVEs)

Essential severity
CVE-2025-62553 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62556 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62560 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62561 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62563 Microsoft Excel Distant Code Execution Vulnerability
CVE-2025-62564 Microsoft Excel Distant Code Execution Vulnerability

 

SharePoint (5 CVEs)

Crucial severity
CVE-2025-62562 Microsoft Outlook Distant Code Execution Vulnerability
Essential severity
CVE-2025-62555 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62558 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62559 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-64672 Microsoft SharePoint Server Spoofing Vulnerability

 

Phrase (4 CVEs)

Crucial severity
CVE-2025-62562 Microsoft Outlook Distant Code Execution Vulnerability
Essential severity
CVE-2025-62555 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62558 Microsoft Phrase Distant Code Execution Vulnerability
CVE-2025-62559 Microsoft Phrase Distant Code Execution Vulnerability

 

Change (2 CVEs)

Essential severity
CVE-2025-64666 Microsoft Change Server Elevation of Privilege Vulnerability
CVE-2025-64667 Microsoft Change Server Spoofing Vulnerability

 

Entry (1 CVE)

Essential severity
CVE-2025-62552 Microsoft Entry Distant Code Execution Vulnerability

Azure (1 CVE)

Essential severity
CVE-2025-62550 Azure Monitor Agent Distant Code Execution Vulnerability

GitHub (1 CVE)

Essential severity
CVE-2025-64671 GitHub Copilot for Jetbrains Distant Code Execution Vulnerability

 

Appendix D: Advisories and Different Merchandise

There are 14 Edge-related advisories famous in December’s launch. All however CVE-2025-62223 originated with Chrome. All have been patched in the course of the earlier week. Please notice that the Microsoft-issued CVE applies solely to Edge for Mac.

CVE-2025-13630 Chromium: CVE-2025-13630 Sort Confusion in V8
CVE-2025-13631 Chromium: CVE-2025-13631 Inappropriate implementation in Google Updater
CVE-2025-13632 Chromium: CVE-2025-13632 Inappropriate implementation in DevTools
CVE-2025-13633 Chromium: CVE-2025-13633 Use after free in Digital Credentials
CVE-2025-13634 Chromium: CVE-2025-13634 Inappropriate implementation in Downloads
CVE-2025-13635 Chromium: CVE-2025-13635 Inappropriate implementation in Downloads
CVE-2025-13636 Chromium: CVE-2025-13636 Inappropriate implementation in Break up View
CVE-2025-13637 Chromium: CVE-2025-13637 Inappropriate implementation in Downloads
CVE-2025-13638 Chromium: CVE-2025-13638 Use after free in Media Stream
CVE-2025-13639 Chromium: CVE-2025-13639 Inappropriate implementation in WebRTC
CVE-2025-13640 Chromium: CVE-2025-13640 Inappropriate implementation in Passwords
CVE-2025-13720 Chromium: CVE-2025-13720 Dangerous forged in Loader
CVE-2025-13721 Chromium: CVE-2025-13721 Race in v8
CVE-2025-62223 Microsoft Edge (Chromium-based) for Mac Spoofing Vulnerability

Adobe is releasing patches for 12 ColdFusion points right now with Bulletin APSB25-105. All 12 CVEs have an effect on ColdFusion 22, 16, 4 and earlier variations.

Crucial severity
CVE-2025-61808 Unrestricted Add of File with Harmful Sort (CWE-434)
CVE-2025-61809 Improper Enter Validation (CWE-20)
CVE-2025-61810 Deserialization of Untrusted Information (CWE-502)
CVE-2025-61811 Improper Entry Management (CWE-284)
CVE-2025-61812 Improper Enter Validation (CWE-20)
CVE-2025-61813 Improper Restriction of XML Exterior Entity Reference (‘XXE’) (CWE-611)
CVE-2025-61830 Deserialization of Untrusted Information (CWE-502)
Essential severity
CVE-2025-61821 Improper Restriction of XML Exterior Entity Reference (‘XXE’) (CWE-611)
CVE-2025-61822 Improper Enter Validation (CWE-20)
CVE-2025-61823 Improper Restriction of XML Exterior Entity Reference (‘XXE’) (CWE-611)
CVE-2025-64897 Improper Entry Management (CWE-284)
CVE-2025-64898 Insufficiently Protected Credentials (CWE-522)

 

Adobe can be releasing patches for 4 Adobe Reader points right now with Bulletin APSB25-119. All 4 CVEs have an effect on Reader variations 25.001.20982, 25.001.20668, 24.001.30273, 20.005.30793, 20.005.30803 and earlier.

Crucial severity
CVE-2025-64785 Untrusted Search Path (CWE-426)
CVE-2025-64899 Out-of-bounds Learn (CWE-125)
Reasonable severity
CVE-2025-64786 Improper Verification of Cryptographic Signature (CWE-347)
CVE-2025-64787 Improper Verification of Cryptographic Signature (CWE-347)

 

For data on the Mariner releases, please scroll to Appendix F.

Appendix E: Affected Home windows Server variations

It is a desk of the 38 CVEs within the December launch affecting Home windows Server variations 2008 by 2025. The desk differentiates amongst main variations of the platform however doesn’t go into deeper element (eg., Server Core). An “x” signifies that the CVE doesn’t apply to that model. Directors are inspired to make use of this appendix as a place to begin to determine their particular publicity, as every reader’s scenario, particularly because it issues merchandise out of mainstream help, will differ. For particular Information Base numbers, please seek the advice of Microsoft.

                   
CVE S-08 8r2 S-12 12r2 S-16 S-19 S-22 23h2 S-25
CVE-2025-54100 ■ ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-55233 × × × × × ■ ■ ■ ■
CVE-2025-59516 × × × × × ■ ■ ■ ■
CVE-2025-59517 × × × × ■ ■ ■ ■ ■
CVE-2025-62221 × × × × × ■ ■ ■ ■
CVE-2025-62454 × × × × × ■ ■ ■ ■
CVE-2025-62455 ■ ■ ■ ■ ■ ■ × × ×
CVE-2025-62456 × × × × × × ■ ■ ■
CVE-2025-62457 × × × × × ■ ■ ■ ■
CVE-2025-62458 × ■ ■ ■ ■ ■ ■ × ×
CVE-2025-62461 × × × × × ■ ■ ■ ■
CVE-2025-62462 × × × × × ■ ■ ■ ■
CVE-2025-62463 × × × × × × ■ ■ ■
CVE-2025-62464 × × × × × ■ ■ ■ ■
CVE-2025-62465 × × × × × × ■ ■ ■
CVE-2025-62466 ■ ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-62467 × × × × × ■ ■ ■ ■
CVE-2025-62468 × × × × × × × ■ ■
CVE-2025-62469 × × × × × × × × ■
CVE-2025-62470 ■ ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-62472 ■ ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-62473 ■ ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-62474 × ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-62549 ■ ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-62565 × × × × ■ ■ ■ ■ ■
CVE-2025-62567 × × × ■ ■ ■ ■ ■ ■
CVE-2025-62569 × × × × × × × ■ ■
CVE-2025-62570 × × × × × × × × ■
CVE-2025-62571 ■ ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-62572 × × × × × × × × ■
CVE-2025-62573 × × × × ■ ■ ■ ■ ■
CVE-2025-64658 × × × × × ■ ■ ■ ■
CVE-2025-64661 × × × × ■ ■ ■ ■ ■
CVE-2025-64670 × × × × × × ■ ■ ■
CVE-2025-64673 × × × × × ■ ■ ■ ■
CVE-2025-64678 ■ ■ ■ ■ ■ ■ ■ ■ ■
CVE-2025-64679 × × × × ■ ■ ■ ■ ■
CVE-2025-64680 × × × × ■ ■ ■ ■ ■


Appendix F: CBL Mariner / Azure Linux

The next desk offers data on 84 CVEs referring to CBL Mariner and / or Azure Linux. All 84 are listed by Microsoft as beneath exploit within the wild. That mentioned, 5 of them even have CVSS Base numbers over 8.5, and we point out these in purple for these needing to prioritize. The CVEs are grouped by severity and additional ordered by CVE.

Crucial severity
CVE-2025-40242 gfs2: Repair unlikely race in gdlm_put_lock
CVE-2025-40244 hfsplus: repair KMSAN uninit-value subject in __hfsplus_ext_cache_extent()
CVE-2025-40251 devlink: price: Unset mum or dad pointer in devl_rate_nodes_destroy
CVE-2025-40262 Enter: imx_sc_key – repair reminiscence corruption on unload
Essential severity
CVE-2025-12385 Improper validation of  tag dimension in Textual content part parser
CVE-2025-12819 Untrusted search path in auth_query connection in PgBouncer
CVE-2025-34297 KissFFT Integer Overflow Heap Buffer Overflow through kiss_fft_alloc
CVE-2025-40223 most: usb: Repair use-after-free in hdm_disconnect
CVE-2025-40233 ocfs2: clear extent cache after transferring/defragmenting extents
CVE-2025-40240 sctp: keep away from NULL dereference when chunk information buffer is lacking
CVE-2025-40258 mptcp: repair race situation in mptcp_schedule_work()
CVE-2025-40272 mm/secretmem: repair use-after-free race in fault handler
CVE-2025-40312 jfs: Confirm inode mode when loading from disk
CVE-2025-40314 usb: cdns3: gadget: Use-after-free throughout failed initialization and exit of cdnsp gadget
CVE-2025-40319 bpf: Sync pending IRQ work earlier than liberating ring buffer
CVE-2025-59775 Apache HTTP Server: NTLM Leakage on Home windows by UNC SSRF
CVE-2025-61729 Extreme useful resource consumption when printing error string for host certificates validation in crypto/x509
CVE-2025-66476 Vim for Home windows Uncontrolled Search Path Component Distant Code Execution Vulnerability
Reasonable severity
CVE-2023-53749 x86: repair clear_user_rep_good() exception dealing with annotation
CVE-2025-12084 Quadratic complexity in node ID cache clearing
CVE-2025-13836 Extreme learn buffering DoS in http.shopper
CVE-2025-40215 xfrm: delete x->tunnel as we delete x
CVE-2025-40217 pidfs: validate extensible ioctls
CVE-2025-40218 mm/damon/vaddr: don’t repeat pte_offset_map_lock() till success
CVE-2025-40219 PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV
CVE-2025-40220 fuse: repair livelock in synchronous file put from fuseblk employees
CVE-2025-40243 hfs: repair KMSAN uninit-value subject in hfs_find_set_zero_bits()
CVE-2025-40245 nios2: make sure that memblock.current_limit is about when setting pfn limits
CVE-2025-40247 drm/msm: Repair pgtable prealloc error path
CVE-2025-40248 vsock: Ignore sign/timeout on join() if already established
CVE-2025-40250 web/mlx5: Clear up solely new IRQ glue on request_irq() failure
CVE-2025-40252 web: qlogic/qede: repair potential out-of-bounds learn in qede_tpa_cont() and qede_tpa_end()
CVE-2025-40253 s390/ctcm: Repair double-kfree
CVE-2025-40254 web: openvswitch: take away never-working help for setting nsh fields
CVE-2025-40257 mptcp: repair a race in mptcp_pm_del_add_timer()
CVE-2025-40259 scsi: sg: Don’t sleep in atomic context
CVE-2025-40261 nvme: nvme-fc: Guarantee ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
CVE-2025-40263 Enter: cros_ec_keyb – repair an invalid reminiscence entry
CVE-2025-40264 be2net: cross wrb_params in case of OS2BMC
CVE-2025-40266 KVM: arm64: Verify the untrusted offset in FF-A reminiscence share
CVE-2025-40268 cifs: shopper: repair reminiscence leak in smb3_fs_context_parse_param
CVE-2025-40269 ALSA: usb-audio: Repair potential overflow of PCM switch buffer
CVE-2025-40273 NFSD: free copynotify stateid in nfs4_free_ol_stateid()
CVE-2025-40275 ALSA: usb-audio: Repair NULL pointer dereference in snd_usb_mixer_controls_badd
CVE-2025-40277 drm/vmwgfx: Validate command header dimension towards SVGA_CMD_MAX_DATASIZE
CVE-2025-40278 web: sched: act_ife: initialize struct tc_ife to repair KMSAN kernel-infoleak
CVE-2025-40279 web: sched: act_connmark: initialize struct tc_ife to repair kernel leak
CVE-2025-40280 tipc: Repair use-after-free in tipc_mon_reinit_self().
CVE-2025-40281 sctp: stop doable shift-out-of-bounds in sctp_transport_update_rto
CVE-2025-40282 Bluetooth: 6lowpan: reset link-local header on ipv6 recv path
CVE-2025-40283 Bluetooth: btusb: reorder cleanup in btusb_disconnect to keep away from UAF
CVE-2025-40284 Bluetooth: MGMT: cancel mesh ship timer when hdev eliminated
CVE-2025-40285 smb/server: repair doable refcount leak in smb2_sess_setup()
CVE-2025-40286 smb/server: repair doable reminiscence leak in smb2_read()
CVE-2025-40287 exfat: repair improper examine of dentry.stream.valid_size
CVE-2025-40288 drm/amdgpu: Repair NULL pointer dereference in VRAM logic for APU units
CVE-2025-40289 drm/amdgpu: cover VRAM sysfs attributes on GPUs with out VRAM
CVE-2025-40292 virtio-net: repair acquired size examine in huge packets
CVE-2025-40293 iommufd: Don’t overflow throughout division for soiled monitoring
CVE-2025-40294 Bluetooth: MGMT: Repair OOB entry in parse_adv_monitor_pattern()
CVE-2025-40297 web: bridge: repair use-after-free as a consequence of MST port state bypass
CVE-2025-40301 Bluetooth: hci_event: validate skb size for unknown CC opcode
CVE-2025-40303 btrfs: guarantee no soiled metadata is written again for an fs with errors
CVE-2025-40304 fbdev: Add bounds checking in bit_putcs to repair vmalloc-out-of-bounds
CVE-2025-40305 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN
CVE-2025-40306 orangefs: repair xattr associated buffer overflow…
CVE-2025-40307 exfat: validate cluster allocation bits of the allocation bitmap
CVE-2025-40308 Bluetooth: bcsp: obtain information provided that registered
CVE-2025-40309 Bluetooth: SCO: Repair UAF on sco_conn_free
CVE-2025-40310 amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw
CVE-2025-40311 accel/habanalabs: help mapping cb with vmalloc-backed coherent reminiscence
CVE-2025-40313 ntfs3: fake $Prolong information as common information
CVE-2025-40315 usb: gadget: f_fs: Repair epfile null pointer entry after ep allow.
CVE-2025-40317 regmap: slimbus: repair bus_context pointer in regmap init calls
CVE-2025-40321 wifi: brcmfmac: repair crash whereas sending Motion Frames in standalone AP Mode
CVE-2025-40322 fbdev: bitblit: bound-check glyph index in bit_putcs*
CVE-2025-40323 fbcon: Set fb_display[i]->mode to NULL when the mode is launched
CVE-2025-40324 NFSD: Repair crash in nfsd4_read_release()
CVE-2025-61727 Improper utility of excluded DNS identify constraints when verifying wildcard names in crypto/x509
CVE-2025-65082 Apache HTTP Server: CGI setting variable override
CVE-2025-65637 A denial-of-service vulnerability exists in github.com/sirupsen/logrus when utilizing Entry.Author() to log a single-line payload bigger than 64KB with out newline characters.
CVE-2025-66200 Apache HTTP Server: mod_userdir+suexec bypass through AllowOverride FileInfo
CVE-2025-66293 LIBPNG has an out-of-bounds learn in png_image_read_composite
Low severity
CVE-2025-13837 Out-of-memory when loading Plist

 

 

 

Tags: bigDecembersFinishNewsPatchSophosTuesday
Admin

Admin

Next Post
US TikTok buyers in limbo as deal set to be delayed once more

US TikTok buyers in limbo as deal set to be delayed once more

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

E-mail Bombs Exploit Lax Authentication in Zendesk – Krebs on Safety

E-mail Bombs Exploit Lax Authentication in Zendesk – Krebs on Safety

October 18, 2025
Pete Parsons Is Leaving Bungie

Pete Parsons Is Leaving Bungie

August 22, 2025

Trending.

How you can open the Antechamber and all lever places in Blue Prince

How you can open the Antechamber and all lever places in Blue Prince

April 14, 2025
The most effective methods to take notes for Blue Prince, from Blue Prince followers

The most effective methods to take notes for Blue Prince, from Blue Prince followers

April 20, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
AI Girlfriend Chatbots With No Filter: 9 Unfiltered Digital Companions

AI Girlfriend Chatbots With No Filter: 9 Unfiltered Digital Companions

May 18, 2025
Constructing a Actual-Time Dithering Shader

Constructing a Actual-Time Dithering Shader

June 4, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Europol Raids Disrupt Black Axe Cybercrime Ring in Spain – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

Europol Raids Disrupt Black Axe Cybercrime Ring in Spain – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

January 11, 2026
A brand new CRISPR startup is betting regulators will ease up on gene-editing

A brand new CRISPR startup is betting regulators will ease up on gene-editing

January 11, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved