Microsoft Addresses Three Active Zero-Day Vulnerabilities in October 2025 Patch

Thursday, October 16, 2025
Top 5 Cybersecurity Stories You Should Know
-
Microsoft Addresses Three Active Zero-Day Vulnerabilities in October 2025 Patch — tl;dr: In its October 2025 Patch Tuesday, Microsoft released fixes for over 175 vulnerabilities, including three zero-days: CVE-2025-24990, CVE-2025-59230, and CVE-2025-47827. CVE-2025-24990 affects a driver for the Agere Modem, allowing attackers to gain admin privileges, while CVE-2025-59230 targets the Windows Remote Access Connection Manager, enabling privilege escalation to SYSTEM. CVE-2025-47827 impacts IGEL OS, allowing Secure Boot bypass. Users are urged to update their systems promptly to mitigate these risks, especially as some vulnerabilities are actively exploited in the wild.
↪ https://www.helpnetsecurity.com/2025/10/15/microsoft-patch-tuesday-zero-days-cve-2025-24990-cve-2025-59230-cve-2025-47827/ -
Google Addresses Chrome Sandbox Escape Zero-Day CVE-2025-6558 — tl;dr: Google has released a security update for Chrome to fix six vulnerabilities, including a high-severity zero-day, CVE-2025-6558, which is actively exploited by attackers to escape the browser's sandbox. This vulnerability affects Chrome versions prior to 138.0.7204.157 and allows attackers to execute arbitrary code via a specially crafted HTML page. Users are strongly advised to update their browsers immediately to mitigate risks. This marks the fifth actively exploited flaw addressed in Chrome this year, highlighting the ongoing security challenges faced by users.
↪ https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-sandbox-escape-zero-day-in-chrome/ -
Two Windows Zero-Days Exploited: CVE-2025-24990 Affects All Versions — tl;dr: Microsoft has identified two critical zero-day vulnerabilities, CVE-2025-24990 and CVE-2025-59230, both allowing elevation of privilege, actively exploited in the wild. CVE-2025-24990, affecting all Windows versions, will see the vulnerable Agere Modem Driver removed entirely. CVE-2025-59230 targets the Remote Access Connection Manager. Organizations must prioritize patching these vulnerabilities, as they could allow attackers to execute code with elevated privileges. Additionally, a Secure Boot bypass vulnerability in IGEL OS has also been exploited. Users should apply the latest security updates promptly to mitigate risks.
↪ https://thehackernews.com/2025/10/two-new-windows-zero-days-exploited-in.html -
Microsoft October 2025 Patch Fixes 175 Vulnerabilities, Including 6 Zero-Days — tl;dr: Microsoft's October 2025 Patch Tuesday addresses 175 vulnerabilities across its products, including critical remote code execution (RCE) flaws and six zero-day vulnerabilities. Notably, three of these zero-days are actively exploited, affecting Windows, Office, and Azure services. Users and administrators are urged to deploy the updates immediately to mitigate risks, particularly those related to privilege escalation and potential ransomware attacks. The update also includes the removal of the Agere Modem driver, which may impact legacy fax hardware. Prompt action is essential to enhance security and reduce exposure to threats.
↪ https://intruceptlabs.com/2025/10/microsoft-october-patch-fixes-175-vulnerabilities-6-zero-days-critical-exploits/ -
October 2025 Patch Tuesday: 172 CVEs, Including 3 Zero-Days and 8 Critical Vulnerabilities — tl;dr: On October 10, 2025, Microsoft released its Patch Tuesday updates, addressing 172 CVEs, including two publicly disclosed vulnerabilities and three zero-day exploits. Among these, eight vulnerabilities were classified as critical, posing significant risks to users and organizations. Affected products include various Windows operating systems and Microsoft applications. It is crucial for IT administrators and users to promptly apply these patches to mitigate potential threats and safeguard their systems against exploitation. Regular updates are essential for maintaining cybersecurity hygiene.
↪ https://malware.news/t/october-2025-patch-tuesday-two-publicly-disclosed-three-zero-days-and-eight-critical-vulnerabilities-among-172-cves/100134
Featured LufSec Resource
AI Hacking: Secure Large Language Models — Red-team and harden LLM apps with practical guardrails.
Explore →
Connect with LufSec
- YouTube: https://www.youtube.com/@lufsec
- Instagram: https://www.instagram.com/lufsec