November, 2025: Patch Tuesday - Only One Zero Day!

Welcome to my November Patch Tuesday newsletter. Today Microsoft released 63 updates and a long list of 168 additional updates for a total of 209 updates in the past 30 days. Wow, so let's get started.

We have only one zero-day to look at which is quite refreshing that it's only one this month.

This month's zero day is CVE-2025-62215. This elevation of privilege vulnerability has a rather high CVSS score. Successful exploitation requires an attacker to win a race condition resulting in SYSTEM privileges. This affects various Windows OS's shown in the chart below. You will want to get this patched ASAP.

Besides our zero day we also have 18 other "Critical" rated updates for the month. These are in the chart below in bold.

As you can see in the chart below we still have Windows 10 listed in the Windows OS row. Keep in mind that today is the first update for Windows 10 in the Extended Security Updates (ESU) program. So if you have any Win10 systems in your environment, make sure they are getting updated still. It's highly recommended to get these updated to Win11 or throw out these old images and reimage these machines with Win11. If you are a small shop and cost is a concern, you can join the ESU program through Microsoft. You can learn more about the process and costs here.

Besides that it is a pretty normal month. Below the chart you will find a long list of Azure Linux and CBL Mariner products and versions. I didn't want to "clog up" the chart with all that data so I put it below the chart. See you next month!

Happy patching!

So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month.

Patch data provided by:

LOGbinder.com

Technology

Products Affected

Severity

Reference

Workaround/ Exploited / Publicly Disclosed

Vulnerability Info

Windows

Windows 10, 11

Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2025 including Server Core Installations

Critical

CVE-2025-59505
CVE-2025-59506
CVE-2025-59507
CVE-2025-59508
CVE-2025-59509
CVE-2025-59510
CVE-2025-59511
CVE-2025-59512
CVE-2025-59513
CVE-2025-59514
CVE-2025-59515
CVE-2025-60703
CVE-2025-60704
CVE-2025-60705
CVE-2025-60706
CVE-2025-60707
CVE-2025-60708
CVE-2025-60709
CVE-2025-60710
CVE-2025-60713
CVE-2025-60714
CVE-2025-60715
CVE-2025-60716
CVE-2025-60717
CVE-2025-60718
CVE-2025-60719
CVE-2025-60720
CVE-2025-60721
CVE-2025-60723
CVE-2025-60724
CVE-2025-62208
CVE-2025-62209
CVE-2025-62213
CVE-2025-62215*
CVE-2025-62217
CVE-2025-62218
CVE-2025-62219
CVE-2025-62452

Workaround: No
Exploited: Yes*
Public: No

Denial of Service

Elevation of Privilege

Information Disclosure

Remote Code Execution

Edge

Chromium-based

Edge for Android

Important

CVE-2025-11756
CVE-2025-12036
CVE-2025-12428
CVE-2025-12429
CVE-2025-12430
CVE-2025-12431
CVE-2025-12432
CVE-2025-12433
CVE-2025-12434
CVE-2025-12435
CVE-2025-12436
CVE-2025-12437
CVE-2025-12438
CVE-2025-12439
CVE-2025-12440
CVE-2025-12441
CVE-2025-12443
CVE-2025-12444
CVE-2025-12445
CVE-2025-12446
CVE-2025-12447
CVE-2025-12725
CVE-2025-12726
CVE-2025-12727
CVE-2025-12728
CVE-2025-12729
CVE-2025-60711

Workaround: No
Exploited: No
Public: No

Remote Code Execution

Office

365 Apps for Enterprise

Excel 2016

Office 2016, 2019

LTSC 2021, 2024 including for Mac

Office for Android

Office Online Server

Critical

CVE-2025-59240
CVE-2025-60722
CVE-2025-60724
CVE-2025-60726
CVE-2025-60727
CVE-2025-60728
CVE-2025-62199
CVE-2025-62200
CVE-2025-62201
CVE-2025-62202
CVE-2025-62203
CVE-2025-62205
CVE-2025-62216

Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Information Disclosure

Remote Code Execution

SharePoint

Enterprise Server 2016

Server 2019

Server Subscription Edition

Important

CVE-2025-62204

Workaround: No
Exploited: No
Public: No
Remote Code Execution

SQL Server

2016 SP3 GDR, Azure Connect Feature Pack

2017 CU31, GDR

2019 CU32, GDR

2022 CU21, GDR

Important

CVE-2025-59499

Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Azure

Compute Resource Provider

Event Grid System

Managed Redis

Monitor

Notification Service

Critical

CVE-2025-59273
CVE-2025-59500
CVE-2025-59503
CVE-2025-59504

Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Remote Code Execution

Developer Tools

Visual Studio Code

Visual Studio Code CoPilot Chat Extension

Visual Studio 2022 v17.14

Critical

CVE-2025-62214
CVE-2025-62222
CVE-2025-62449
CVE-2025-62453

Workaround: No
Exploited: No
Public: No

Remote Code Execution

Security Feature Bypass

Open Source Software

Windows Subsystem for Linux GUI

*See more products and versions below chart

Critical

CVE-2025-11411
CVE-2025-11839
CVE-2025-11840
CVE-2025-12058
CVE-2025-12060
CVE-2025-39967
CVE-2025-39968
CVE-2025-39969
CVE-2025-39970
CVE-2025-39971
CVE-2025-39972

CVE-2025-39973
CVE-2025-39977
CVE-2025-39980
CVE-2025-39981
CVE-2025-39982
CVE-2025-39985
CVE-2025-39987
CVE-2025-39990
CVE-2025-39994
CVE-2025-39998
CVE-2025-40001
CVE-2025-40003
CVE-2025-40005
CVE-2025-40016
CVE-2025-40018
CVE-2025-40019
CVE-2025-40020
CVE-2025-40021
CVE-2025-40024
CVE-2025-40025
CVE-2025-40026
CVE-2025-40027
CVE-2025-40029
CVE-2025-40030
CVE-2025-40032
CVE-2025-40033
CVE-2025-40035
CVE-2025-40038
CVE-2025-40040
CVE-2025-40042
CVE-2025-40043
CVE-2025-40044
CVE-2025-40048
CVE-2025-40049
CVE-2025-40051
CVE-2025-40052
CVE-2025-40053
CVE-2025-40056
CVE-2025-40057
CVE-2025-40060
CVE-2025-40061
CVE-2025-40064
CVE-2025-40065
CVE-2025-40068
CVE-2025-40071
CVE-2025-40074
CVE-2025-40075
CVE-2025-40078
CVE-2025-40079
CVE-2025-40080
CVE-2025-40081
CVE-2025-40083
CVE-2025-40084
CVE-2025-40085
CVE-2025-40087
CVE-2025-40088
CVE-2025-40092
CVE-2025-40094
CVE-2025-40095
CVE-2025-40096
CVE-2025-40097
CVE-2025-40099
CVE-2025-40100
CVE-2025-40102
CVE-2025-40103
CVE-2025-40104
CVE-2025-40105
CVE-2025-40106
CVE-2025-40778
CVE-2025-40780
CVE-2025-47912
CVE-2025-53040
CVE-2025-53042
CVE-2025-53044
CVE-2025-53045
CVE-2025-53053
CVE-2025-53054
CVE-2025-53062
CVE-2025-53069
CVE-2025-58183
CVE-2025-58185
CVE-2025-58186
CVE-2025-58187
CVE-2025-58188
CVE-2025-58189
CVE-2025-59530
CVE-2025-61100
CVE-2025-61101
CVE-2025-61102
CVE-2025-61103
CVE-2025-61104
CVE-2025-61105
CVE-2025-61106
CVE-2025-61107
CVE-2025-61723
CVE-2025-61724
CVE-2025-61725
CVE-2025-62168
CVE-2025-62220
CVE-2025-62229
CVE-2025-62230
CVE-2025-62231
CVE-2025-62518
CVE-2025-62813
CVE-2025-8677

Workaround: No
Exploited: No
Public: No

Remote Code Execution

Dynamics

365 Field Service (online)

365 (on-premises) v9.1

Important

CVE-2025-62206
CVE-2025-62210
CVE-2025-62211

Workaround: No
Exploited: No
Public: No

Information Disclosure

Spoofing

System Center

Configuration Manager 2403, 2409, 2503

Important

CVE-2025-47179
CVE-2025-59501
Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Spoofing

Other

PowerScribe One v2023.1 SP2 Patch 7

PowerScribe 360v4.0.1 - v.4.0.9 and 2019.1 - 2019.10

Critical

CVE-2025-30398

Workaround: No
Exploited: No
Public: No

Information Disclosure

I didn't want to overflow the chart with the products and versions in this month's release for "Open Source Software". Below is a list of products and versions included:

Azure Linux:
azl3 bind 9.20.11-1, azl3 binutils 2.41-9, azl3 containerized-data-importer 1.57.0-16, azl3 coredns 1.11.4-10, azl3 frr 9.1.1-3, azl3 gcc 13.2.0-7, azl3 gh 2.62.0-9, azl3 golang 1.23.12-1, azl3 golang 1.25.3-1, azl3 kata-containers-cc 3.15.0.aks0-5, azl3 keras 3.3.3-4, azl3 kernel 6.6.104.2-4, azl3 kernel 6.6.96.2-2, azl3 libcontainers-common 20240213-3, azl3 lz4 1.9.4-1, azl3 moby-engine 25.0.3-13, azl3 mysql 8.0.43-1, azl3 python-tensorboard 2.16.2-6, azl3 skopeo 1.14.4-6, azl3 squid 6.13-1, azl3 squid 6.13-3, azl3 tensorflow 2.16.1-9, azl3 unbound 1.19.1-4, azl3 xorg-x11-server-Xwayland 24.1.6-2

CBL Mariner:
cbl2 bind 9.16.50-2, cbl2 binutils 2.37-17, cbl2 containerized-data-importer 1.55.0-25, cbl2 coredns 1.11.1-22, cbl2 cri-o 1.22.3-16, cbl2 frr 8.5.5-3, cbl2 gcc 11.2.0-8, cbl2 golang 1.18.8-10, cbl2 golang 1.22.7-5, cbl2 keras 2.11.0-3, cbl2 libcontainers-common 20210626-7, cbl2 lz4 1.9.4-1, cbl2 moby-engine 24.0.9-18, cbl2 msft-golang 1.24.8-1, cbl2 mysql 8.0.43-1, cbl2 python-tensorboard 2.11.0-3, cbl2 skopeo 1.14.2-12, cbl2 tensorflow 2.11.1-2, cbl2 unbound 1.19.1-3