Webinar Library
Welcome to my November Patch Tuesday newsletter. Today Microsoft released 63 updates and a long list of 168 additional updates for a total of 209 updates in the past 30 days. Wow, so let's get started. We have only one zero-day to look at which is quite refreshing that it's only one this month. This month's zero day is CVE-2025-62215. This elevation of privilege vulnerability has a rather high CVSS score. Successful exploitation requires an attacker to win a race condition resulting in SYSTEM privileges. This affects various Windows OS's shown in the chart below. You will want to get this patched ASAP. Besides our zero day we also have 18 other "Critical" rated updates for the month. These are in the chart below in bold. As you can see in the chart below we still have Windows 10 listed in the Windows OS row. Keep in mind that today is the first update for Windows 10 in the Extended Security Updates (ESU) program. So if you have any Win10 systems in your environment, make sure they are getting updated still. It's highly recommended to get these updated to Win11 or throw out these old images and reimage these machines with Win11. If you are a small shop and cost is a concern, you can join the ESU program through Microsoft. You can learn more about the process and costs here. Besides that it is a pretty normal month. Below the chart you will find a long list of Azure Linux and CBL Mariner products and versions. I didn't want to "clog up" the chart with all that data so I put it below the chart. See you next month! Happy patching!
So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month.
Patch data provided by:
Technology
Products Affected
Severity
Reference
Workaround/ Exploited / Publicly Disclosed
Vulnerability Info
Windows
Windows 10, 11
Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2025 including Server Core Installations
Critical
CVE-2025-59505 CVE-2025-59506 CVE-2025-59507 CVE-2025-59508 CVE-2025-59509 CVE-2025-59510 CVE-2025-59511 CVE-2025-59512 CVE-2025-59513 CVE-2025-59514 CVE-2025-59515 CVE-2025-60703 CVE-2025-60704 CVE-2025-60705 CVE-2025-60706 CVE-2025-60707 CVE-2025-60708 CVE-2025-60709 CVE-2025-60710 CVE-2025-60713 CVE-2025-60714 CVE-2025-60715 CVE-2025-60716 CVE-2025-60717 CVE-2025-60718 CVE-2025-60719 CVE-2025-60720 CVE-2025-60721 CVE-2025-60723 CVE-2025-60724 CVE-2025-62208 CVE-2025-62209 CVE-2025-62213 CVE-2025-62215* CVE-2025-62217 CVE-2025-62218 CVE-2025-62219 CVE-2025-62452
Denial of Service Elevation of Privilege Information Disclosure Remote Code Execution
Edge
Chromium-based Edge for Android
Important
CVE-2025-11756 CVE-2025-12036 CVE-2025-12428 CVE-2025-12429 CVE-2025-12430 CVE-2025-12431 CVE-2025-12432 CVE-2025-12433 CVE-2025-12434 CVE-2025-12435 CVE-2025-12436 CVE-2025-12437 CVE-2025-12438 CVE-2025-12439 CVE-2025-12440 CVE-2025-12441 CVE-2025-12443 CVE-2025-12444 CVE-2025-12445 CVE-2025-12446 CVE-2025-12447 CVE-2025-12725 CVE-2025-12726 CVE-2025-12727 CVE-2025-12728 CVE-2025-12729 CVE-2025-60711
Workaround: No Exploited: No Public: No
Office
365 Apps for Enterprise Excel 2016 Office 2016, 2019 LTSC 2021, 2024 including for Mac Office for Android Office Online Server
CVE-2025-59240 CVE-2025-60722 CVE-2025-60724 CVE-2025-60726 CVE-2025-60727 CVE-2025-60728 CVE-2025-62199 CVE-2025-62200 CVE-2025-62201 CVE-2025-62202 CVE-2025-62203 CVE-2025-62205 CVE-2025-62216
Elevation of Privilege Information Disclosure Remote Code Execution
SharePoint
Enterprise Server 2016 Server 2019 Server Subscription Edition
CVE-2025-62204
SQL Server
2016 SP3 GDR, Azure Connect Feature Pack 2017 CU31, GDR 2019 CU32, GDR 2022 CU21, GDR
CVE-2025-59499
Elevation of Privilege
Azure
Compute Resource Provider Event Grid System Managed Redis Monitor Notification Service
CVE-2025-59273 CVE-2025-59500 CVE-2025-59503 CVE-2025-59504
Developer Tools
Visual Studio Code Visual Studio Code CoPilot Chat Extension Visual Studio 2022 v17.14
CVE-2025-62214 CVE-2025-62222 CVE-2025-62449 CVE-2025-62453
Open Source Software
Windows Subsystem for Linux GUI *See more products and versions below chart
CVE-2025-11411 CVE-2025-11839 CVE-2025-11840 CVE-2025-12058 CVE-2025-12060 CVE-2025-39967 CVE-2025-39968 CVE-2025-39969 CVE-2025-39970 CVE-2025-39971 CVE-2025-39972 CVE-2025-39973 CVE-2025-39977 CVE-2025-39980 CVE-2025-39981 CVE-2025-39982 CVE-2025-39985 CVE-2025-39987 CVE-2025-39990 CVE-2025-39994 CVE-2025-39998 CVE-2025-40001 CVE-2025-40003 CVE-2025-40005 CVE-2025-40016 CVE-2025-40018 CVE-2025-40019 CVE-2025-40020 CVE-2025-40021 CVE-2025-40024 CVE-2025-40025 CVE-2025-40026 CVE-2025-40027 CVE-2025-40029 CVE-2025-40030 CVE-2025-40032 CVE-2025-40033 CVE-2025-40035 CVE-2025-40038 CVE-2025-40040 CVE-2025-40042 CVE-2025-40043 CVE-2025-40044 CVE-2025-40048 CVE-2025-40049 CVE-2025-40051 CVE-2025-40052 CVE-2025-40053 CVE-2025-40056 CVE-2025-40057 CVE-2025-40060 CVE-2025-40061 CVE-2025-40064 CVE-2025-40065 CVE-2025-40068 CVE-2025-40071 CVE-2025-40074 CVE-2025-40075 CVE-2025-40078 CVE-2025-40079 CVE-2025-40080 CVE-2025-40081 CVE-2025-40083 CVE-2025-40084 CVE-2025-40085 CVE-2025-40087 CVE-2025-40088 CVE-2025-40092 CVE-2025-40094 CVE-2025-40095 CVE-2025-40096 CVE-2025-40097 CVE-2025-40099 CVE-2025-40100 CVE-2025-40102 CVE-2025-40103 CVE-2025-40104 CVE-2025-40105 CVE-2025-40106 CVE-2025-40778 CVE-2025-40780 CVE-2025-47912 CVE-2025-53040 CVE-2025-53042 CVE-2025-53044 CVE-2025-53045 CVE-2025-53053 CVE-2025-53054 CVE-2025-53062 CVE-2025-53069 CVE-2025-58183 CVE-2025-58185 CVE-2025-58186 CVE-2025-58187 CVE-2025-58188 CVE-2025-58189 CVE-2025-59530 CVE-2025-61100 CVE-2025-61101 CVE-2025-61102 CVE-2025-61103 CVE-2025-61104 CVE-2025-61105 CVE-2025-61106 CVE-2025-61107 CVE-2025-61723 CVE-2025-61724 CVE-2025-61725 CVE-2025-62168 CVE-2025-62220 CVE-2025-62229 CVE-2025-62230 CVE-2025-62231 CVE-2025-62518 CVE-2025-62813 CVE-2025-8677
Remote Code Execution
Dynamics
365 Field Service (online) 365 (on-premises) v9.1
CVE-2025-62206 CVE-2025-62210 CVE-2025-62211
Information Disclosure Spoofing
System Center
Configuration Manager 2403, 2409, 2503
Elevation of Privilege Spoofing
Other
PowerScribe One v2023.1 SP2 Patch 7 PowerScribe 360v4.0.1 - v.4.0.9 and 2019.1 - 2019.10
CVE-2025-30398
Information Disclosure
I didn't want to overflow the chart with the products and versions in this month's release for "Open Source Software". Below is a list of products and versions included: Azure Linux: azl3 bind 9.20.11-1, azl3 binutils 2.41-9, azl3 containerized-data-importer 1.57.0-16, azl3 coredns 1.11.4-10, azl3 frr 9.1.1-3, azl3 gcc 13.2.0-7, azl3 gh 2.62.0-9, azl3 golang 1.23.12-1, azl3 golang 1.25.3-1, azl3 kata-containers-cc 3.15.0.aks0-5, azl3 keras 3.3.3-4, azl3 kernel 6.6.104.2-4, azl3 kernel 6.6.96.2-2, azl3 libcontainers-common 20240213-3, azl3 lz4 1.9.4-1, azl3 moby-engine 25.0.3-13, azl3 mysql 8.0.43-1, azl3 python-tensorboard 2.16.2-6, azl3 skopeo 1.14.4-6, azl3 squid 6.13-1, azl3 squid 6.13-3, azl3 tensorflow 2.16.1-9, azl3 unbound 1.19.1-4, azl3 xorg-x11-server-Xwayland 24.1.6-2 CBL Mariner: cbl2 bind 9.16.50-2, cbl2 binutils 2.37-17, cbl2 containerized-data-importer 1.55.0-25, cbl2 coredns 1.11.1-22, cbl2 cri-o 1.22.3-16, cbl2 frr 8.5.5-3, cbl2 gcc 11.2.0-8, cbl2 golang 1.18.8-10, cbl2 golang 1.22.7-5, cbl2 keras 2.11.0-3, cbl2 libcontainers-common 20210626-7, cbl2 lz4 1.9.4-1, cbl2 moby-engine 24.0.9-18, cbl2 msft-golang 1.24.8-1, cbl2 mysql 8.0.43-1, cbl2 python-tensorboard 2.11.0-3, cbl2 skopeo 1.14.2-12, cbl2 tensorflow 2.11.1-2, cbl2 unbound 1.19.1-3