Microsoft Released December 2025 Software Updates
Microsoft has released software updates as part of its December 2025 Patch Tuesday. The updates fix 57 security vulnerabilities in total, including 3 zero-day vulnerabilities, 1 of which is being actively exploited.
The breakdown of the vulnerabilities are as follows:
28 privilege escalation
19 remote code execution
4 information disclosure
3 denial of service
2 spoofing
The actively exploited vulnerabilities are as follows:
CVE-2025-62221 - vulnerability in Windows Cloud Files Mini Filter Driver that leads to elevation of privilege
CVE-2025-64671 - vulnerability in GitHub Copilot for JetBrains that leads to remote code execution
CVE-2025-54100 - vulnerability in PowerShell that leads to remote code execution
Why You Should Care?
Zero-day vulnerabilities are vulnerabilities where a flaw has been identified but there was no fix for the flaw, which means attackers will try to exploit as many targets as possible before users fix the vulnerability. This makes it extra dangerous, and needs to be addressed as soon as possible.
In this case, one of the zero-day vulnerabilities is actively exploited, which means attackers are already attacking businesses. It is only a matter of time before the attackers compromise your business. Now that patches are available, it is critical to apply the patches as soon as possible to avoid getting compromised.
What Should You Do?
Test the patches ASAP at your organization, and make sure it does not break any business applications
Prioritize patching the zero-day vulnerabilities
Roll out the rest of the Patch Tuesday updates
References
https://www.bleepingcomputer.com/news/microsoft/microsoft-december-2025-patch-tuesday-fixes-3-zero-days-57-flaws/
