A dangerous flaw in how Windows environments handle Kerberos service ticket requests one that significantly expands the practical attack surface for Kerberos relaying in Active Directory.
Summary : Microsoft’s November 2025 Patch Tuesday resolves 63 vulnerabilities across multiple Microsoft components. The Microsoft Patch Tuesday also addresses four “Critical” vulnerabilities, two of which are remote code execution vulnerabilities, one is an elevation of privileges and the fourth is an information disclosure flaw.
OEM
Microsoft
Severity
Critical
Date of Announcement
2025-11-11
No. of Patches
63
Actively Exploited
Yes
Exploited in Wild
Yes
Advisory Version
1.0
Overview : Key Updateson Patch Tuesday
The update includes one actively exploited zero-day vulnerability (CVE-2025-62215) in the Windows Kernel and five additional Critical-rated vulnerabilities affecting Office, DirectX, GDI+, Visual Studio, and Nuance PowerScribe.
This release continues Microsoft’s focus on privilege escalation and remote code execution (RCE) vulnerabilities, highlighting the urgent need for comprehensive patch management across enterprise systems.
Here are the CVE addresses for Microsoft & non-Microsoft:
63 Microsoft CVEs addressed
5 non-Microsoft CVEs addressed (Republished)
Breakdown of October 2025 Vulnerabilities
29 Elevation of Privilege (EoP)
16 Remote Code Execution (RCE)
11 Information Disclosure
3 Denial of Service (DoS)
2 Security Feature Bypass
2 Spoofing
Source: Microsoft
Vulnerability Name
CVE ID
Product Affected
Severity
CVSS Score
Windows Kernel Elevation of Privilege Vulnerability (Zero-Day, Exploited in Wild)
CVE-2025-62215
Windows 10, 11, Server 2016–2022
Critical
9.0
Microsoft Office Use-After-Free Remote Code Execution Vulnerability
CVE-2025- 62199
Microsoft Office (Word/Excel/Office Suite)
Critical
9.8
Nuance PowerScribe Missing Authorization Information Disclosure Vulnerability
CVE-2025-30398
Nuance PowerScribe 360
Critical
9.1
Windows DirectX Graphics Kernel Use-After-Free Vulnerability
CVE-2025-60716
Windows DirectX Graphics Kernel
Critical
8.8
Microsoft GDI+ Heap-Based Buffer Overflow RCE Vulnerability
CVE-2025-60724
Microsoft Graphics Component (GDI+)
Critical
8.7
Visual Studio Command Injection Remote Code Execution Vulnerability
CVE-2025-62214
Microsoft Visual Studio / Visual Studio Code
Critical
8.1
Technical Summary
The zero-day is a Windows Kernel bug that lets attackers gain full system control. Other critical & important vulnerabilities include Office and GDI+ vulnerabilities that could allow hackers to run malicious code or steal data.
Microsoft also patched issues in Visual Studio, DirectX, and Azure services. Users and admins are strongly advised to install these updates right away to stay protected.
CVE ID
System Affected
Vulnerability Details
Impact
CVE-2025-62215
Windows Kernel
Race conditions in shared resource execution enables local attackers to elevate privileges to SYSTEM (Zero-Day; Exploited in Wild)
Elevation of Privilege
CVE-2025-62199
Microsoft Office
Use-after-free vulnerability in Office allows RCE via malicious documents, typically delivered through phishing campaigns
Remote Code Execution
CVE-2025-30398
Nuance PowerScribe 360
Missing authorization vulnerability allows disclosure of sensitive medical or user data over the network
Information Disclosure
CVE-2025-60716
Windows DirectX Graphics Kernel
Use-after-free conditions allow local attackers to escalate privileges, potentially compromising the entire system
Elevation of Privilege
CVE-2025-60724
Microsoft GDI+
Heap-based buffer overflow allows attackers to execute arbitrary code remotely via crafted network traffic or malicious files
Remote Code Execution
CVE-2025-62214
Visual Studio
Command injection vulnerability allows attackers to execute arbitrary code locally in developer environments
Remote Code Execution
Source: Microsoft
In addition to several other Important severity vulnerabilities were addressed below –
The November 2025 security updates address critical and important vulnerabilities across a broad range of Microsoft products and services:
Windows Core Components
Updates for Kernel, Hyper-V, Kerberos, RRAS, WinSock, Smart Card, Bluetooth subsystems.
Microsoft Office Suite
Patches for Word, Excel, and related components impacted by RCE and Information Disclosure vulnerabilities.
Azure & Cloud Services
Fixes for Azure Monitor Agent, Dynamics 365, Entra ID, and related connectors.
Graphics Components
Patches for GDI+, DirectX, WSL GUI.
Developer Tools
Updates for Visual Studio, Visual Studio Code, and GitHub Copilot.
Third-Party Applications
Patches for Nuance PowerScribe (Medical domain).
Mobile Platform Technologies
Updates for Microsoft OneDrive for Android.
Remediation:
Install the November 2025 Microsoft security updates immediately across all Windows, Office, and Azure systems.
Here are some recommendations below
Monitor for Indicators of Compromise (IoCs) for privilege escalation attempts, new SYSTEM-level services, or unusual Office file crashes.
Ensure Windows 10 ESU enrollment for extended support systems.
Restrict local admin privileges and enforce least-privilege access.
Leverage EDR/SIEM solutions to detect suspicious kernel and Office activity.
Segment critical systems and disable unused network services (RRAS, SMB).
Conclusion: Microsoft’s November 2025 Patch Tuesday resolves 63 vulnerabilities, including one actively exploited Zero-Day and multiple Critical RCE and EoP vulnerabilities in Office, Windows Kernel, GDI+, and Visual Studio.
Given the confirmed exploitation and the presence of memory corruption vulnerabilities, immediate patch deployment is necessary to prevent potential ransomware and privilege escalation attacks in our modern cyber world.
Summary : A critical unauthenticated access vulnerability in Triofox is being actively exploited in the wild by threat actor UNC6485. Attackers exploit a Host header spoofing vulnerability to bypass authentication, create native admin accounts and chain abuse of the built-in antivirus feature to execute arbitrary code under SYSTEM privileges.
OEM
Gladinet
Severity
Critical
CVSS Score
9.1
CVEs
CVE-2025-12480
POC Available
YES
Actively Exploited
YES
Exploited in Wild
YES
Advisory Version
1.0
Overview
Triofox is an enterprise file-sharing and remote access platform by Gladinet that enables secure file sync, sharing, and collaboration across on-premises and cloud environments. Immediate upgrade is mandatory to prevent full system compromise, ransomware and persistent remote access.
Vulnerability Name
CVE ID
Product Affected
Severity
Fixed Version
Unauthenticated Access via Host Header Spoofing & Antivirus RCE Chain
CVE-2025-12480
Triofox
Critical
v16.7.10368.56560 or later
Technical Summary
The vulnerability in the CanRunCriticalPage() function within GladPageUILib.dll, which allows access to setup pages, if the Host header is “localhost” – without validating the request origin. Attackers spoof this header externally to initiate the setup process, create a Cluster Admin account, and gain authenticated access.
Once logged in, attackers exploit the antivirus configuration feature, which allows arbitrary executable paths. By uploading a malicious script to a shared folder and setting it as the antivirus scanner, the file executes with SYSTEM-level privileges inherited from the Triofox service.
CVE ID
System Affected
Vulnerability Details
Impact
CVE-2025- 12480
Triofox < 16.7.10368.56560
Host header attack bypasses authentication to AdminDatabase.aspx that enables admin account creation. Chained with antivirus path abuse to run uploaded payloads as SYSTEM
Authentication Bypass, Admin Account Creation, Remote Code Execution, Full System Compromise, Persistent Access, Data Exfiltration, Lateral Movement
IP address of the attacker used to initially exploit CVE-2025-12480 to create the admin account and gain access to the Triofox instance
65.109.204[.]197
AS24950 – Hetzner Online GmbH
After a dormant period, the threat actor used this IP address to login back into the Triofox instance and carry out subsequent activities
84.200.80[.]252
AS214036 – Ultahost, Inc.
IP address hosting the installer for the Zoho UEMSAgent remote access tool
216.107.136[.]46
AS396356 – LATITUDE-SH
Plink C2
Source: cloud.google.com
Recommendations:
Upgrade Triofox to version 16.7.10368.56560 or latest from the official Gladinet portal.
Conclusion: This vulnerability represents a severe supply-chain risk in enterprise file-sharing platforms, enabling zero-authentication RCE through misconfigured access controls and feature abuse. With active in-the-wild exploitation by UNC6485 and rapid post-patch attacks, delayed patching significantly increases breach likelihood.
Immediate upgrade, log monitoring, and network hardening are essential to prevent ransomware deployment, data theft, and network pivoting. This incident reinforces the need for secure-by-design input validation and principle of least privilege in remote access tools.
Overview : Brash Vulnerability works on Google Chrome and all web browsers that run on Chromium.
A newly disclosed vulnerability, Brash, exposed a critical architectural flaw in Chromium’s Blink rendering engine. Blink is Chromium’s open-source rendering engine responsible for parsing HTML, CSS, and JavaScript, building the DOM and render trees, and executing script-driven updates to the browser interface.
It underpins the user experience of all Chromium-based browsers and is a core component of their performance and stability.
The issue allows a malicious web page to crash Chromium-based browsers within seconds, including Chrome, Microsoft Edge, Brave, Opera etc. The attack works by overloading Blink’s main UI thread using a flood of unthrottled DOM operations. A public proof-of-concept (PoC) exploit is available and can be tested on machines, that escalating the urgency for patching across all Chromium-based platforms.
Technical Details
Blink lacks any rate limiting or coalescing on rapid document. title updates, allowing an attacker to flood the browser with millions of DOM mutations per second.
This saturates the browser’s main UI thread, causing extreme CPU usage and blocking event processing, which leads to the browser tab freezing or crashing within 15 to 60 seconds. The exploit can also be use to trigger after a delay or at a precise scheduled time, turning it into a highly controllable logic bomb.
The exploit requires no special permissions beyond navigating to a malicious page, presenting a severe and immediate operational risk until patches are deployed.
Attack Flow
Recommendations
You can follow the recommendations below
Avoid clicking on suspicious or untrusted links, especially those prompting unexpected redirects or downloads.
Keep all Chromium-based browsers (Chrome, Edge, Brave etc.) updated with the latest security patches as vendors release fixes.
Enforce automatic browser updates within organizations to ensure all users receive critical patches promptly.
Monitor computer endpoints for unusual CPU spikes related to browser processes, which can indicate ongoing exploitation attempts.
Educate users and employees about the risk of drive-by attacks through malicious websites and the importance of security awareness.
Conclusion: The Brash vulnerability reveals how a simple architectural oversight. It lets attackers crash browsers by flooding them with too many title updates too fast, causing the browser to freeze or crash. This attack can be scheduled to happen later, making it harder to detect.
Mozilla Firefox and Apple Safari are immune to the attack, as are all third-party browsers on iOS, given that they are all based on WebKit.
The best defense is to keep browsers updated, avoid suspicious links and stay alert for unusual computer slowdowns.
Docker Compose Path Traversal VulnerabilityEnables Arbitrary File Write and System Compromise
Summary:
OEM
Docker
Severity
High
CVSS Score
8.9
CVEs
CVE-2025-62725
Date of Announcement
2025-10-28
Actively Exploited
No
Exploited in Wild
No
Advisory Version
1.0
Overview
A high-severity path traversal vulnerability was identified in Docker Compose, a widely-used tool for defining and managing multi-container Docker applications.
This flaw occurs in the handling of remote OCI-based Compose artifacts, allowing an attacker to craft malicious artifact annotations that bypass directory restrictions. As a result, malicious files can be written outside the intended cache directory on the host system.
This vulnerability can be triggered even by seemingly harmless commands such as docker compose ps or docker compose config that resolve remote artifacts. Organizations should upgrade immediately to avoid possible system compromise.
Vulnerability Name
CVE ID
Product Affected
Severity
CVSS Score
Path Traversal in OCI Artifacts Allowing Arbitrary File Write
CVE-2025-62725
Docker Compose CLI
High
8.9
Technical Summary
Docker Compose added support for fetching Compose files as OCI artifacts from remote registries. These artifacts contain layers with annotations indicating file paths for writing.
The vulnerability exists because Docker Compose did not sanitize or validate these path annotations prior to writing files, allowing path traversal sequences to escape the cache directory.
Attackers can exploit this by publishing malicious OCI artifacts with crafted annotations, leading to arbitrary file writes anywhere the Compose process has permissions, potentially overwriting sensitive files such as SSH authorized_keys, escalating privileges and compromising the host. The flaw affects Docker Compose versions prior to v2.40.2.
CVE ID
System Affected
Vulnerability Details
Impact
CVE-2025-62725
Docker Compose (Linux, Windows, macOS)
Path traversal via malicious remote OCI artifact annotations allowing arbitrary file write outside the Compose cache directory.
Arbitrary file write, potential system compromise, privilege escalation.
Remediation
Apply security patches immediately to mitigate risks from privilege escalation and container escape.
Update Docker-compose to v2.40.2 or the latest one.
Conclusion
Docker Compose vulnerability poses a serious risk of arbitrary file writes and system compromise through malicious OCI artifacts.
Due to the ease of exploitation when using remote Compose files, all users and organizations should upgrade to the patched Docker Compose version immediately, scrutinize remote artifact usage, and enhance their container security hygiene to mitigate this significant threat.
Recent Comments