WinRar and SharePoint and SonicWall, oh my! Between the WinRAR zero-day, the SharePoint zero-day, and the SonicWall zero-day (that SonicWall claims totally wasn’t actually a zero-day), it’s been a very busy month for bad guys on the internet. Thankfully, Microsoft’s Patch Tuesday is here to fix all our problems (and potentially break a few things in the process). Here are the deets!
Severity
Total exploits patched: 107
Critical patches: 13
Important: 91
Moderate: 2
Low: 1
Vulnerability impact
Remote code execution: 35
Elevation of privilege: 42
Information disclosure: 16
Spoofing: 9
Tampering: 1
Denial of service: 4
Availability
Publicly disclosed: 1
Actively exploited: 0
Some highlights (or lowlights)
CVE-2025-50165: CVE-2025-50165 is a 9.8 rated critical remote code execution vulnerability in the Windows Graphics Component affecting Windows Server 2025 and Windows 11 24H2. As if we needed more reasons to dislike 24H2. What’s worse is this can all happen over the network without any user interaction or privileges. Thankfully, the PoC is still publicly unavailable at this time.
CVE-2025-53766: Also coming in at a 9.8 is CVE-2025-53766. This vulnerability takes advantage of a heap-based buffer overflow exploit in the GDI+ subsystem. An attacker could use a malicious metafile to gain remote code execution and information disclosure on affected systems.
CVE-2025-53779: Our lone zero-day CVE for today is CVE-2025-53779, which is a relative path traversal exploit impacting Windows Kerberos on Server 2025 and could lead to an elevation of privilege and potentially domain administrator access. To take advantage of this vulnerability, an attacker would need to have elevated access to the following delegated managed service accounts (dMSA) attributes:
msds-groupMSAMembership
msds-ManagedAccountPrecededByLink
Wrapping up
It seems like exploits, both old and new, have been making headlines more frequently these days. Maybe it’s code complexity. Maybe it’s AI-powered cybervillains. Or maybe the universe just really wants sysadmins to lose sleep (it’s definitely not the caffeine). Whatever the cause, don’t let your company make the next cyberattack news headline. Get PDQ Connect and automate your patch deployments.
Until next month, stay safe, stay patched, and stay out of the spotlight.
Automate your patching
Keep Windows devices patched and secure from the cloud.
Loading...