Microsoft September 2025 Patch Tuesday


Microsoft has released its September 2025 Patch Tuesday update, addressing a total of 81 security vulnerabilities across its product portfolio.

This extensive release includes fixes for two zero-day vulnerabilities that are actively being exploited. Among the patched flaws, ten are rated as “Critical,” while the remaining 71 are classified as “Important.”

The updates cover a wide range of products, including Windows, Microsoft Office, Azure, SQL Server, and Windows Defender.

ImpactCount
Elevation of Privilege (EoP)38
Remote Code Execution (RCE)22
Information Disclosure14
Denial of Service (DoS)4
Security Feature Bypass2
Spoofing1
Total81

Zero-Day Flaws Patched

This month’s security release is particularly significant due to the inclusion of patches for two zero-day vulnerabilities. The first, CVE-2025-55234, is an Elevation of Privilege (EoP) vulnerability in the Windows Server Message Block (SMB) protocol.

According to Microsoft, an attacker who successfully exploits this flaw could execute relay attacks, potentially allowing them to gain elevated privileges on affected systems.

Given the widespread use of SMB for file sharing, this vulnerability poses a considerable risk and should be patched immediately.

The second zero-day, CVE-2024-21907, is a denial-of-service vulnerability in Newtonsoft.Json, a popular JSON framework for .NET.

The flaw stems from improper handling of exceptional conditions, where specially crafted data passed to the JsonConvert.DeserializeObject method can trigger a StackOverflow exception, causing the application to crash.

This vulnerability can be exploited remotely by an unauthenticated attacker, and Microsoft has confirmed it impacts SQL Server installations that use the affected library.

Critical Remote Code Execution and Privilege Escalation Bugs

Beyond the zero-days, Microsoft addressed ten critical vulnerabilities, many of which could lead to Remote Code Execution (RCE) or Elevation of Privilege.

Several critical RCE flaws were discovered in the Windows Graphics Kernel and Component, including CVE-2025-55226, CVE-2025-55228, and CVE-2025-55236.

These vulnerabilities are caused by race conditions, allowing an authorized attacker to execute arbitrary code on a target machine.

Other critical vulnerabilities include a heap-based buffer overflow in Microsoft Office (CVE-2025-54910) and a race condition flaw in Windows Hyper-V (CVE-2025-55224), both of which could permit remote code execution.

A critical Elevation of Privilege vulnerability in Windows NTLM (CVE-2025-54918) was also patched, which could allow an authorized attacker to elevate their privileges over the network through improper authentication.

The high volume of important-rated flaws, spanning products from Microsoft Excel and SharePoint to the Windows Kernel and PowerShell, underscores the broad scope of this month’s update.

Of the 81 vulnerabilities addressed in Microsoft’s September 2025 Patch Tuesday, none were reported as publicly disclosed or actively exploited. The release includes patches for 8 Critical and 73 Important severity flaws.

Below is a comprehensive table of all vulnerabilities fixed in this update, with links to the official Microsoft Security Response Center (MSRC) advisories.

CVEVulnerability DetailsActively ExploitedTypeSeverity
Critical Vulnerabilities
CVE-2025-54918Improper authentication in Windows NTLM allows for network-based privilege elevation.NoElevation of PrivilegeCritical
CVE-2025-55226A race condition in the Graphics Kernel can be exploited for local code execution.NoRemote Code ExecutionCritical
CVE-2025-55228A race condition in the Windows Graphics Component allows local code execution.NoRemote Code ExecutionCritical
CVE-2025-55236A race condition in the Graphics Kernel could lead to local code execution.NoRemote Code ExecutionCritical
CVE-2025-53799Use of an uninitialized resource in the Windows Imaging Component leads to information disclosure.NoInformation DisclosureCritical
CVE-2025-53800A flaw in the Microsoft Graphics Component can be used for local privilege elevation.NoElevation of PrivilegeCritical
CVE-2025-54910A heap-based buffer overflow in Microsoft Office allows for local remote code execution.NoRemote Code ExecutionCritical
CVE-2025-55224A race condition in Windows Hyper-V can be used for local code execution.NoRemote Code ExecutionCritical
Important Vulnerabilities
CVE-2024-21907A flaw in Newtonsoft.Json used by SQL Server can lead to a denial-of-service condition.NoDenial of ServiceImportant
CVE-2025-49734A flaw in PowerShell Direct allows for local privilege escalation.NoElevation of PrivilegeImportant
CVE-2025-53797A buffer over-read in RRAS allows for information disclosure over a network.NoInformation DisclosureImportant
CVE-2025-53798A buffer over-read in RRAS allows for information disclosure over a network.NoInformation DisclosureImportant
CVE-2025-54095An out-of-bounds read in RRAS allows for network-based information disclosure.NoInformation DisclosureImportant
CVE-2025-54096An out-of-bounds read in RRAS allows for network-based information disclosure.NoInformation DisclosureImportant
CVE-2025-54097An out-of-bounds read in RRAS allows for network-based information disclosure.NoInformation DisclosureImportant
CVE-2025-54099A stack-based buffer overflow in the Ancillary Function Driver for WinSock allows privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54101A use-after-free flaw in the Windows SMBv3 Client allows for remote code execution.NoRemote Code ExecutionImportant
CVE-2025-54102A use-after-free flaw in the Connected Devices Platform Service can be used for privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54106An integer overflow in RRAS could allow an attacker to execute code over the network.NoRemote Code ExecutionImportant
CVE-2025-54110An integer overflow in the Windows Kernel can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54111A use-after-free flaw in Windows UI XAML allows for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54894A vulnerability in the Local Security Authority Subsystem Service leads to privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54895An integer overflow in SPNEGO NEGOEX allows for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54896A use-after-free vulnerability in Microsoft Excel allows for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54897Deserialization of untrusted data in SharePoint can lead to remote code execution.NoRemote Code ExecutionImportant
CVE-2025-54898An out-of-bounds read in Microsoft Excel can be used for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54899Freeing memory not on the heap in Microsoft Excel can lead to local code execution.NoRemote Code ExecutionImportant
CVE-2025-54902An out-of-bounds read in Microsoft Excel allows for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54903A use-after-free vulnerability in Microsoft Excel allows for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54904A use-after-free vulnerability in Microsoft Excel allows for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54905An untrusted pointer dereference in Microsoft Word can lead to information disclosure.NoInformation DisclosureImportant
CVE-2025-54906Freeing memory not on the heap in Microsoft Office can lead to local code execution.NoRemote Code ExecutionImportant
CVE-2025-54907A heap-based buffer overflow in Microsoft Visio allows for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54908A use-after-free vulnerability in Microsoft PowerPoint allows for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54913A race condition in Windows UI XAML Maps can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54916A stack-based buffer overflow in Windows NTFS allows for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54919A race condition in the Windows Graphics Component leads to local code execution.NoRemote Code ExecutionImportant
CVE-2025-55223A race condition in the DirectX Graphics Kernel allows for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-55225An out-of-bounds read in RRAS allows for network-based information disclosure.NoInformation DisclosureImportant
CVE-2025-55232Deserialization of untrusted data in HPC Pack can lead to remote code execution.NoRemote Code ExecutionImportant
CVE-2025-55245Improper link resolution in Xbox Gaming Services can lead to local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-55243Exposure of sensitive information in Microsoft OfficePlus can lead to spoofing.NoSpoofingImportant
CVE-2025-55316External control of a file name or path in Azure Arc allows for privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-55317Improper link resolution in Microsoft AutoUpdate can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-49692Improper access control in the Azure Connected Machine Agent allows local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-47997A race condition in SQL Server can lead to network-based information disclosure.NoInformation DisclosureImportant
CVE-2025-53796A buffer over-read in RRAS allows for information disclosure over a network.NoInformation DisclosureImportant
CVE-2025-53801An untrusted pointer dereference in the DWM Core Library can lead to local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-53802A use-after-free flaw in the Windows Bluetooth Service can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-53803An error message in the Windows Kernel could disclose sensitive information locally.NoInformation DisclosureImportant
CVE-2025-53804Exposure of sensitive information in a Windows Kernel-Mode Driver can lead to local information disclosure.NoInformation DisclosureImportant
CVE-2025-53805An out-of-bounds read in HTTP.sys can lead to a denial of service.NoDenial of ServiceImportant
CVE-2025-53806A buffer over-read in RRAS allows for information disclosure over a network.NoInformation DisclosureImportant
CVE-2025-53807A race condition in the Microsoft Graphics Component allows for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-53808A type confusion flaw in the Windows Defender Firewall Service can lead to local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-53809Improper input validation in LSASS can lead to a denial of service.NoDenial of ServiceImportant
CVE-2025-53810A type confusion flaw in the Windows Defender Firewall Service can lead to local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54091An integer overflow in Windows Hyper-V can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54092A race condition in Windows Hyper-V can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54093A race condition in the Windows TCP/IP Driver allows for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54094A type confusion flaw in the Windows Defender Firewall Service can lead to local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54098Improper access control in Windows Hyper-V can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54103A use-after-free flaw in Windows Management Service can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54104A type confusion flaw in the Windows Defender Firewall Service can lead to local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54105A race condition in the Brokering File System can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54107Improper path resolution in MapUrlToZone can lead to a security feature bypass.NoSecurity Feature BypassImportant
CVE-2025-54108A race condition in the Capability Access Management Service allows for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54109A type confusion flaw in the Windows Defender Firewall Service can lead to local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54112A use-after-free flaw in Microsoft Virtual Hard Disk can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54113A heap-based buffer overflow in RRAS allows for remote code execution.NoRemote Code ExecutionImportant
CVE-2025-54114A race condition in the Connected Devices Platform Service can lead to a denial of service.NoDenial of ServiceImportant
CVE-2025-54115A race condition in Windows Hyper-V can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54116Improper access control in Windows MultiPoint Services allows for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54900A heap-based buffer overflow in Microsoft Excel allows for local code execution.NoRemote Code ExecutionImportant
CVE-2025-54901A buffer over-read in Microsoft Excel can lead to local information disclosure.NoInformation DisclosureImportant
CVE-2025-54911A use-after-free flaw in Windows BitLocker can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54912A use-after-free flaw in Windows BitLocker can be used for local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54915A type confusion flaw in the Windows Defender Firewall Service can lead to local privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-54917A protection mechanism failure in MapUrlToZone can lead to a security feature bypass.NoSecurity Feature BypassImportant
CVE-2025-55227A command injection vulnerability in SQL Server allows for network-based privilege elevation.NoElevation of PrivilegeImportant
CVE-2025-55234A flaw in Windows SMB could allow an attacker to perform relay attacks, leading to privilege elevation.NoElevation of PrivilegeImportant

System administrators are strongly urged to review the September 2025 release and apply all relevant security updates promptly to mitigate these risks.

Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.



Source link