Inhalte springen

A big finish to 2025 in December’s Patch Tuesday

A month with no Critical-severity Windows bugs is overshadowed by a mass of Mariner mop-up
Angela Gunn

Microsoft on Tuesday released 56 patches affecting 10 product families. Two of the addressed issues are considered by Microsoft to be of Critical severity – and, unusually, both belong to the blended Office-365 product family. Eight have a CVSS base score of 8.0 or higher. One is known to be under active exploit in the wild, and two others are publicly disclosed.

That’s the good news. We’ll get to the advisories in a moment.

At patch time, six CVEs are judged more likely to be exploited in the next 30 days by the company’s estimation, in addition to the one already detected to be so. Various of this month’s issues are amenable to direct detection by Sophos protections, and we include information on those in a table below.

The release also includes information on 14 Edge patches released last week, as well as 12 ColdFusion and four Adobe Reader patches released today. (The sole Edge patch originating with Microsoft is counted in this total rather in the general Patch Tuesday count of 56; the rest originated with Chromium itself and were patched earlier in the month.) We have included information on all those patches in Appendix D. There is no update to the Servicing Stack listed in Microsoft’s manifest this month.

Microsoft also released information on 84 CVEs affecting CBL Mariner and/or Azure Linux. All 84 CVEs originated with MITRE and have been addressed over the course of the past week, and all 84 are indicated as exploited in in the wild (though none are marked as publicly disclosed). Little information was made available on these 84 CVEs, but we’ve provided some guidance in Appendix F at the end of the post.

We are as always including at the end of this post appendices listing all Microsoft’s patches sorted by severity (Appendix A), by predicted exploitability timeline and CVSS Base score (Appendix B), and by product family (Appendix C). Appendix E provides a breakout of the patches affecting the various Windows Server platforms.

By the numbers

  • Total CVEs: 56
  • Publicly disclosed: 2
  • Exploit detected: 1
  • Severity
    • Critical: 2
    • Important: 54
  • Impact
    • Denial of Service: 3
    • Elevation of Privilege: 28
    • Information Disclosure: 4
    • Remote Code Execution: 19
    • Spoofing: 2
  • CVSS Base score 9.0 or greater: 0
  • CVSS Base score 8.0 or greater: 8

 

pt2512-fig01.webp

 

Figure 1: Elevation of Privilege issues were the most numerous in the December collection, once again

Products

  • Windows: 38
  • 365: 13
  • Office: 13
  • Excel: 6
  • SharePoint: 5
  • Word: 4
  • Exchange: 2
  • Access: 1
  • Azure: 1
  • GitHub: 1

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect. We note, by the way, that CVE names don’t always reflect affected product families closely. In particular, some CVEs names in the Office family may mention products that don’t appear in the list of products affected by the CVE, and vice versa.

 

pt2512-fig02.webp

 

Figure 2: A smaller, heavily end-user-oriented group of product families received patches this month. Though Windows accounts for half of them, patches related to the operating system are all Important in severity

Notable December updates

In addition to the issues discussed above, several specific items merit attention.

CVE-2025-62554 — Microsoft Office Remote Code Execution Vulnerability
CVE-2025-62555 — Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62557 — Microsoft Office Remote Code Execution Vulnerability
CVE-2025-62558 — Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62559 — Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62560 — Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62561 — Microsoft Excel Remote Code Execution Vulnerability

All seven of these RCE issues affect multiple versions of 365 and Office, including Microsoft Office LTSC for Mac 2021 and 2024. However, the patches for those Mac versions aren’t ready yet. Users responsible for updating Macs are asked to monitor the CVE information for each vulnerability for further word on those patches. Of the seven, pay special attention to CVE-2025-62554 and CVE-2025-62257 (the two simply called “Office” vulnerabilities) – they’re the ones which Preview Pane is an attack vector. Those two CVEs are Critical-severity and have a CVSS Base score of 8.4. The others are Important-severity.

CVE-2025-54100 — PowerShell Remote Code Execution Vulnerability

As with the 84 Mariner vulnerabilities mentioned above, the release of this patch arrived with less information than Microsoft-issued CVEs generally do. That said, this Important-class issue is allotted to Windows; as with the GitHub issue discussed below, it involves improper neutralization of special elements used in a command. For this one, Microsoft notes that after installation, users attempting to deploy the Invoke-WebRequest command will get a new confirmation prompt warning them of potentially unwanted script code execution and recommending that they include the -UseBasicParsing switch to keep things behaving nicely.

CVE-2025-64666 — Microsoft Exchange Server Elevation of Privilege Vulnerability
CVE-2025-64667 — Microsoft Exchange Server Spoofing Vulnerability

These two Important-severity bugs both affect Exchange Server 2016 and 2019, which are out-of-support versions of Exchange – unless you’re paying for Microsoft’s Extended Security Update (ESU) program, you’re not getting these patches. (Exchange Server Subscription Edition subscribers are covered.) The EoP is a fairly specialized item that would require the attacker to prepare the target environment ahead of time, while the Spoofing bug affects, specifically, how From: addresses are displayed to the user.

CVE-2025-64671 — GitHub Copilot for Jetbrains Remote Code Execution Vulnerability

The only publicly disclosed vulnerability so far this month allows the Jetbrain AI-based coding assistant to ruin the vibe-coding vibe, thanks to improper neutralization of special elements used in a command. According to Microsoft, an attacker could execute additional commands by appending them to commands allowed in the user’s terminal auto-approve setting. This vulnerability is credited to independent researcher Ari Marzouk, who just last weekend posted analysis of a potentially lively new class of vulnerabilities in AI IDEs. An intriguing read.

 

pt2512-fig03.webp

 

Figure 3: The year wrapped up with Elevation of Privilege and Remote Code Execution swapping spots at the top of the charts. Note, though, that even though there were fewer RCE bugs squashed this year, there was a higher percentage of Critical-severity RCEs. Overall there were 92 Critical-severity CVEs address in 2025 compared to 55 last year.

 

pt2512-fig04.webp

 

Figure 4: Behold the final (one hopes) 2025 tally: In the end, it was the most patch-heavy year (1196 excluding out-of-band patch releases) since 2020 (1245 patches excluding out-of-bands), with two record-breaking months in January and October.

 

Sophos protections

CVESophos Intercept X/Endpoint IPSSophos XGS Firewall
CVE-2025-59516Exp/2559516-AExp/2559516-A
CVE-2025-59517Exp/2559517-AExp/2559517-A
CVE-2025-62221Exp/2562221-AExp/2562221-A
CVE-2025-62454Exp/2562454-AExp/2562454-A
CVE-2025-62470Exp/2562470-AExp/2562470-A
CVE-2025-62472Exp/2562472-AExp/2562472-A

 

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of December patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.

Elevation of Privilege (28 CVEs)

Important severity
CVE-2025-55233Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-59516Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62221Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62454Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62455Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2025-62457Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458Win32k Elevation of Privilege Vulnerability
CVE-2025-62461Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62462Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62464Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62466Windows Client-Side Caching Elevation of Privilege Vulnerability
CVE-2025-62467Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62469Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-62470Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62474Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62565Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-62569Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-62571Windows Installer Elevation of Privilege Vulnerability
CVE-2025-62572Application Information Service Elevation of Privilege Vulnerability
CVE-2025-62573DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-64658Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-64661Windows Shell Elevation of Privilege Vulnerability
CVE-2025-64666Microsoft Exchange Server Elevation of Privilege Vulnerability
CVE-2025-64673Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-64679Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-64680Windows DWM Core Library Elevation of Privilege Vulnerability

Remote Code Execution (19 CVEs)

Critical severity
CVE-2025-62554Microsoft Office Remote Code Execution Vulnerability
CVE-2025-62557Microsoft Office Remote Code Execution Vulnerability
Important severity
CVE-2025-54100PowerShell Remote Code Execution Vulnerability
CVE-2025-62456Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVE-2025-62549Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-62550Azure Monitor Agent Remote Code Execution Vulnerability
CVE-2025-62552Microsoft Access Remote Code Execution Vulnerability
CVE-2025-62553Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62555Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62556Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62558Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62559Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62560Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62561Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62562Microsoft Outlook Remote Code Execution Vulnerability
CVE-2025-62563Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62564Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-64671GitHub Copilot for Jetbrains Remote Code Execution Vulnerability
CVE-2025-64678Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Information Disclosure (4 CVEs)

Important severity
CVE-2025-62468Windows Defender Firewall Service Information Disclosure Vulnerability
CVE-2025-62473Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-62570Windows Camera Frame Server Monitor Information Disclosure Vulnerability
CVE-2025-64670Windows DirectX Information Disclosure Vulnerability

 

Denial of Service (3 CVEs)

Important severity
CVE-2025-62463DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62465DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62567Windows Hyper-V Denial of Service Vulnerability

 

Spoofing (2 CVEs)

Important severity
CVE-2025-64667Microsoft Exchange Server Spoofing Vulnerability
CVE-2025-64672Microsoft SharePoint Server Spoofing Vulnerability

 

Appendix B: Exploitability and CVSS

This is a list of the December CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE.

Exploitation more likely within the next 30 days
CVE-2025-59516Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62454Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458Win32k Elevation of Privilege Vulnerability
CVE-2025-62470Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

 

The CVE listed below was known to be under active exploit prior to the release of this month’s patches.

CVE-2025-62221Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

 

These are the December CVEs with a Microsoft-assessed CVSS Base score of 8.0 or higher. They are arranged by score and further sorted by CVE. For more information on how CVSS works, please see our series on patch prioritization schema.

CVSS BaseCVSS TemporalCVETitle
8.87.7CVE-2025-62456Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
8.87.7CVE-2025-62549Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
8.87.7CVE-2025-62550Azure Monitor Agent Remote Code Execution Vulnerability
8.87.7CVE-2025-64672Microsoft SharePoint Server Spoofing Vulnerability
8.87.7CVE-2025-64678Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
8.47.3CVE-2025-62554Microsoft Office Remote Code Execution Vulnerability
8.47.3CVE-2025-62557Microsoft Office Remote Code Execution Vulnerability
8.47.3CVE-2025-64671GitHub Copilot for Jetbrains Remote Code Execution Vulnerability

 

Appendix C: Products Affected

This is a list of December’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family. Certain issues for which advisories have been issued are covered in Appendix D, and issues affecting Windows Server are further sorted in Appendix E. All CVE titles are accurate as made available by Microsoft; for further information on why certain products may appear in titles and not product families (or vice versa), please consult Microsoft.

Windows (38 CVEs)

Important severity 
CVE-2025-54100PowerShell Remote Code Execution Vulnerability
CVE-2025-55233Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-59516Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62221Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62454Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62455Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2025-62456Windows Resilient File System (ReFS) Remote Code Execution Vulnerability
CVE-2025-62457Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458Win32k Elevation of Privilege Vulnerability
CVE-2025-62461Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62462Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62463DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62464Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62465DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62466Windows Client-Side Caching Elevation of Privilege Vulnerability
CVE-2025-62467Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62468Windows Defender Firewall Service Information Disclosure Vulnerability
CVE-2025-62469Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-62470Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62473Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-62474Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62549Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-62565Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-62567Windows Hyper-V Denial of Service Vulnerability
CVE-2025-62569Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2025-62570Windows Camera Frame Server Monitor Information Disclosure Vulnerability
CVE-2025-62571Windows Installer Elevation of Privilege Vulnerability
CVE-2025-62572Application Information Service Elevation of Privilege Vulnerability
CVE-2025-62573DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-64658Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-64661Windows Shell Elevation of Privilege Vulnerability
CVE-2025-64670Windows DirectX Information Disclosure Vulnerability
CVE-2025-64673Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-64678Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-64679Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-64680Windows DWM Core Library Elevation of Privilege Vulnerability

365 (13 CVEs)

Critical severity
CVE-2025-62554Microsoft Office Remote Code Execution Vulnerability
CVE-2025-62557Microsoft Office Remote Code Execution Vulnerability
CVE-2025-62562Microsoft Outlook Remote Code Execution Vulnerability
Important severity
CVE-2025-62552Microsoft Access Remote Code Execution Vulnerability
CVE-2025-62553Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62555Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62556Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62558Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62559Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62560Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62561Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62563Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62564Microsoft Excel Remote Code Execution Vulnerability

 

Office (13 CVEs)

Critical severity
CVE-2025-62554Microsoft Office Remote Code Execution Vulnerability
CVE-2025-62557Microsoft Office Remote Code Execution Vulnerability
Important severity
CVE-2025-62552Microsoft Access Remote Code Execution Vulnerability
CVE-2025-62553Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62555Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62556Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62558Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62559Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62560Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62561Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62562Microsoft Outlook Remote Code Execution Vulnerability
CVE-2025-62563Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62564Microsoft Excel Remote Code Execution Vulnerability

 

Excel (6 CVEs)

Important severity
CVE-2025-62553Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62556Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62560Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62561Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62563Microsoft Excel Remote Code Execution Vulnerability
CVE-2025-62564Microsoft Excel Remote Code Execution Vulnerability

 

SharePoint (5 CVEs)

Critical severity
CVE-2025-62562Microsoft Outlook Remote Code Execution Vulnerability
Important severity
CVE-2025-62555Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62558Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62559Microsoft Word Remote Code Execution Vulnerability
CVE-2025-64672Microsoft SharePoint Server Spoofing Vulnerability

 

Word (4 CVEs)

Critical severity
CVE-2025-62562Microsoft Outlook Remote Code Execution Vulnerability
Important severity
CVE-2025-62555Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62558Microsoft Word Remote Code Execution Vulnerability
CVE-2025-62559Microsoft Word Remote Code Execution Vulnerability

 

Exchange (2 CVEs)

Important severity
CVE-2025-64666Microsoft Exchange Server Elevation of Privilege Vulnerability
CVE-2025-64667Microsoft Exchange Server Spoofing Vulnerability

 

Access (1 CVE)

Important severity
CVE-2025-62552Microsoft Access Remote Code Execution Vulnerability

Azure (1 CVE)

Important severity
CVE-2025-62550Azure Monitor Agent Remote Code Execution Vulnerability

GitHub (1 CVE)

Important severity
CVE-2025-64671GitHub Copilot for Jetbrains Remote Code Execution Vulnerability

 

Appendix D: Advisories and Other Products

There are 14 Edge-related advisories noted in December’s release. All but CVE-2025-62223 originated with Chrome. All were patched during the previous week. Please note that the Microsoft-issued CVE applies only to Edge for Mac.

CVE-2025-13630Chromium: CVE-2025-13630 Type Confusion in V8
CVE-2025-13631Chromium: CVE-2025-13631 Inappropriate implementation in Google Updater
CVE-2025-13632Chromium: CVE-2025-13632 Inappropriate implementation in DevTools
CVE-2025-13633Chromium: CVE-2025-13633 Use after free in Digital Credentials
CVE-2025-13634Chromium: CVE-2025-13634 Inappropriate implementation in Downloads
CVE-2025-13635Chromium: CVE-2025-13635 Inappropriate implementation in Downloads
CVE-2025-13636Chromium: CVE-2025-13636 Inappropriate implementation in Split View
CVE-2025-13637Chromium: CVE-2025-13637 Inappropriate implementation in Downloads
CVE-2025-13638Chromium: CVE-2025-13638 Use after free in Media Stream
CVE-2025-13639Chromium: CVE-2025-13639 Inappropriate implementation in WebRTC
CVE-2025-13640Chromium: CVE-2025-13640 Inappropriate implementation in Passwords
CVE-2025-13720Chromium: CVE-2025-13720 Bad cast in Loader
CVE-2025-13721Chromium: CVE-2025-13721 Race in v8
CVE-2025-62223Microsoft Edge (Chromium-based) for Mac Spoofing Vulnerability

Adobe is releasing patches for 12 ColdFusion issues today with Bulletin APSB25-105. All 12 CVEs affect ColdFusion 22, 16, 4 and earlier versions.

Critical severity
CVE-2025-61808Unrestricted Upload of File with Dangerous Type (CWE-434)
CVE-2025-61809Improper Input Validation (CWE-20)
CVE-2025-61810Deserialization of Untrusted Data (CWE-502)
CVE-2025-61811Improper Access Control (CWE-284)
CVE-2025-61812Improper Input Validation (CWE-20)
CVE-2025-61813Improper Restriction of XML External Entity Reference (‘XXE’) (CWE-611)
CVE-2025-61830Deserialization of Untrusted Data (CWE-502)
Important severity
CVE-2025-61821Improper Restriction of XML External Entity Reference (‘XXE’) (CWE-611)
CVE-2025-61822Improper Input Validation (CWE-20)
CVE-2025-61823Improper Restriction of XML External Entity Reference (‘XXE’) (CWE-611)
CVE-2025-64897Improper Access Control (CWE-284)
CVE-2025-64898Insufficiently Protected Credentials (CWE-522)

 

Adobe is also releasing patches for four Adobe Reader issues today with Bulletin APSB25-119. All four CVEs affect Reader versions 25.001.20982, 25.001.20668, 24.001.30273, 20.005.30793, 20.005.30803 and earlier.

Critical severity
CVE-2025-64785Untrusted Search Path (CWE-426)
CVE-2025-64899Out-of-bounds Read (CWE-125)
Moderate severity
CVE-2025-64786Improper Verification of Cryptographic Signature (CWE-347)
CVE-2025-64787Improper Verification of Cryptographic Signature (CWE-347)

 

For information on the Mariner releases, please scroll to Appendix F.

Appendix E: Affected Windows Server versions

This is a table of the 38 CVEs in the December release affecting Windows Server versions 2008 through 2025. The table differentiates among major versions of the platform but doesn’t go into deeper detail (eg., Server Core). An “x” indicates that the CVE does not apply to that version. Administrators are encouraged to use this appendix as a starting point to ascertain their specific exposure, as each reader’s situation, especially as it concerns products out of mainstream support, will vary. For specific Knowledge Base numbers, please consult Microsoft.

          
CVES-088r2S-1212r2S-16S-19S-2223h2S-25
          
CVE-2025-54100
CVE-2025-55233×××××
CVE-2025-59516×××××
CVE-2025-59517××××
CVE-2025-62221×××××
CVE-2025-62454×××××
CVE-2025-62455×××
CVE-2025-62456××××××
CVE-2025-62457×××××
CVE-2025-62458×××
CVE-2025-62461×××××
CVE-2025-62462×××××
CVE-2025-62463××××××
CVE-2025-62464×××××
CVE-2025-62465××××××
CVE-2025-62466
CVE-2025-62467×××××
CVE-2025-62468×××××××
CVE-2025-62469××××××××
CVE-2025-62470
CVE-2025-62472
CVE-2025-62473
CVE-2025-62474×
CVE-2025-62549
CVE-2025-62565××××
CVE-2025-62567×××
CVE-2025-62569×××××××
CVE-2025-62570××××××××
CVE-2025-62571
CVE-2025-62572××××××××
CVE-2025-62573××××
CVE-2025-64658×××××
CVE-2025-64661××××
CVE-2025-64670××××××
CVE-2025-64673×××××
CVE-2025-64678
CVE-2025-64679××××
CVE-2025-64680××××


Appendix F: CBL Mariner / Azure Linux

The following table provides information on 84 CVEs relating to CBL Mariner and / or Azure Linux. All 84 are listed by Microsoft as under exploit in the wild. That said, five of them also have CVSS Base numbers over 8.5, and we indicate those in red for those needing to prioritize. The CVEs are grouped by severity and further ordered by CVE.

Critical severity
CVE-2025-40242gfs2: Fix unlikely race in gdlm_put_lock
CVE-2025-40244hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
CVE-2025-40251devlink: rate: Unset parent pointer in devl_rate_nodes_destroy
CVE-2025-40262Input: imx_sc_key – fix memory corruption on unload
Important severity
CVE-2025-12385Improper validation of  tag size in Text component parser
CVE-2025-12819Untrusted search path in auth_query connection in PgBouncer
CVE-2025-34297KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc
CVE-2025-40223most: usb: Fix use-after-free in hdm_disconnect
CVE-2025-40233ocfs2: clear extent cache after moving/defragmenting extents
CVE-2025-40240sctp: avoid NULL dereference when chunk data buffer is missing
CVE-2025-40258mptcp: fix race condition in mptcp_schedule_work()
CVE-2025-40272mm/secretmem: fix use-after-free race in fault handler
CVE-2025-40312jfs: Verify inode mode when loading from disk
CVE-2025-40314usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget
CVE-2025-40319bpf: Sync pending IRQ work before freeing ring buffer
CVE-2025-59775Apache HTTP Server: NTLM Leakage on Windows through UNC SSRF
CVE-2025-61729Excessive resource consumption when printing error string for host certificate validation in crypto/x509
CVE-2025-66476Vim for Windows Uncontrolled Search Path Element Remote Code Execution Vulnerability
Moderate severity
CVE-2023-53749x86: fix clear_user_rep_good() exception handling annotation
CVE-2025-12084Quadratic complexity in node ID cache clearing
CVE-2025-13836Excessive read buffering DoS in http.client
CVE-2025-40215xfrm: delete x->tunnel as we delete x
CVE-2025-40217pidfs: validate extensible ioctls
CVE-2025-40218mm/damon/vaddr: do not repeat pte_offset_map_lock() until success
CVE-2025-40219PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV
CVE-2025-40220fuse: fix livelock in synchronous file put from fuseblk workers
CVE-2025-40243hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
CVE-2025-40245nios2: ensure that memblock.current_limit is set when setting pfn limits
CVE-2025-40247drm/msm: Fix pgtable prealloc error path
CVE-2025-40248vsock: Ignore signal/timeout on connect() if already established
CVE-2025-40250net/mlx5: Clean up only new IRQ glue on request_irq() failure
CVE-2025-40252net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()
CVE-2025-40253s390/ctcm: Fix double-kfree
CVE-2025-40254net: openvswitch: remove never-working support for setting nsh fields
CVE-2025-40257mptcp: fix a race in mptcp_pm_del_add_timer()
CVE-2025-40259scsi: sg: Do not sleep in atomic context
CVE-2025-40261nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
CVE-2025-40263Input: cros_ec_keyb – fix an invalid memory access
CVE-2025-40264be2net: pass wrb_params in case of OS2BMC
CVE-2025-40266KVM: arm64: Check the untrusted offset in FF-A memory share
CVE-2025-40268cifs: client: fix memory leak in smb3_fs_context_parse_param
CVE-2025-40269ALSA: usb-audio: Fix potential overflow of PCM transfer buffer
CVE-2025-40273NFSD: free copynotify stateid in nfs4_free_ol_stateid()
CVE-2025-40275ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd
CVE-2025-40277drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
CVE-2025-40278net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak
CVE-2025-40279net: sched: act_connmark: initialize struct tc_ife to fix kernel leak
CVE-2025-40280tipc: Fix use-after-free in tipc_mon_reinit_self().
CVE-2025-40281sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto
CVE-2025-40282Bluetooth: 6lowpan: reset link-local header on ipv6 recv path
CVE-2025-40283Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF
CVE-2025-40284Bluetooth: MGMT: cancel mesh send timer when hdev removed
CVE-2025-40285smb/server: fix possible refcount leak in smb2_sess_setup()
CVE-2025-40286smb/server: fix possible memory leak in smb2_read()
CVE-2025-40287exfat: fix improper check of dentry.stream.valid_size
CVE-2025-40288drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices
CVE-2025-40289drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM
CVE-2025-40292virtio-net: fix received length check in big packets
CVE-2025-40293iommufd: Don’t overflow during division for dirty tracking
CVE-2025-40294Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()
CVE-2025-40297net: bridge: fix use-after-free due to MST port state bypass
CVE-2025-40301Bluetooth: hci_event: validate skb length for unknown CC opcode
CVE-2025-40303btrfs: ensure no dirty metadata is written back for an fs with errors
CVE-2025-40304fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
CVE-2025-403059p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN
CVE-2025-40306orangefs: fix xattr related buffer overflow…
CVE-2025-40307exfat: validate cluster allocation bits of the allocation bitmap
CVE-2025-40308Bluetooth: bcsp: receive data only if registered
CVE-2025-40309Bluetooth: SCO: Fix UAF on sco_conn_free
CVE-2025-40310amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw
CVE-2025-40311accel/habanalabs: support mapping cb with vmalloc-backed coherent memory
CVE-2025-40313ntfs3: pretend $Extend records as regular files
CVE-2025-40315usb: gadget: f_fs: Fix epfile null pointer access after ep enable.
CVE-2025-40317regmap: slimbus: fix bus_context pointer in regmap init calls
CVE-2025-40321wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode
CVE-2025-40322fbdev: bitblit: bound-check glyph index in bit_putcs*
CVE-2025-40323fbcon: Set fb_display[i]->mode to NULL when the mode is released
CVE-2025-40324NFSD: Fix crash in nfsd4_read_release()
CVE-2025-61727Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509
CVE-2025-65082Apache HTTP Server: CGI environment variable override
CVE-2025-65637A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters.
CVE-2025-66200Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo
CVE-2025-66293LIBPNG has an out-of-bounds read in png_image_read_composite
Low severity
CVE-2025-13837Out-of-memory when loading Plist