Analysis of Microsoft Patch Tuesday updates - September 2025

Executive Summary

On Tuesday, 09.09.2025, Microsoft released its monthly security patch addressing 81 vulnerabilities across its products.

By severity:

  • Important - 72;
  • Moderate - 1;
  • Critical - 8.

Exploited (Zero-Days) and Publicly Disclosed Vulnerabilities

Special attention should be paid to the following vulnerability. Fixing it is the highest priority:

  • CVE-2025-55234 (CVSS 8.8; Important) - Windows SMB Elevation of Privilege Vulnerability (Elevation of Privilege). An attacker who successfully exploits this vulnerability can obtain SYSTEM-level privileges. To exploit the vulnerability, the attacker needs access to the target system and the ability to run code with low privileges.

Overview and trends

Microsoft's September 2025 Patch Tuesday includes fixes for 81 vulnerabilities, a notable decrease compared to the large summer releases in August (111) and July (130). Despite the smaller volume, the release contains a number of serious vulnerabilities that require prompt action. Key trends observed this month:

  • Publicly disclosed SMB vulnerability: The main highlight this month is the fix for the publicly disclosed elevation of privilege vulnerability CVE-2025-55234 in Windows SMB. Since information about this vulnerability is already available to attackers, exploitation is highly likely. This makes the SMB patch the highest priority for all administrators.
  • Dominance of elevation of privilege (EoP) vulnerabilities: As in previous months, Elevation of Privilege vulnerabilities make up the overwhelming majority of fixes. This month they affect critical components such as the Windows kernel, NTLM, SQL Server, Hyper-V, and numerous system services, indicating Microsoft's systematic efforts to harden the OS's core security mechanisms.
  • Critical vulnerabilities in key components: This month, 8 critical vulnerabilities were fixed. They affect important products such as NTLM, Microsoft Office, Hyper-V, and Windows graphics components. This underscores that even with a smaller total number of vulnerabilities, the risk level remains high due to the potentially severe impact of exploitation.
  • Continued focus on Routing and Remote Access Service (RRAS): The RRAS service is again in the spotlight, receiving fixes for several remote code execution (RCE) and information disclosure vulnerabilities. This continues the trend of recent months, indicating that this component remains an attractive target for security researchers and attackers.

Full List of Vulnerabilities

Below is a table with all the vulnerabilities fixed this month.

CVETitleTypeCVSSSeverityExploitedPublicly Disclosed
CVE-2025-55234Windows SMB Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoYes
CVE-2025-55232Microsoft High Performance Compute (HPC) Pack Remote Code Execution VulnerabilityRemote Code Execution9.8ImportantNoNo
CVE-2025-54106Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2025-54110Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2025-54113Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2025-54897Microsoft SharePoint Remote Code Execution VulnerabilityRemote Code Execution8.8ImportantNoNo
CVE-2025-54918Windows NTLM Elevation of Privilege VulnerabilityElevation of Privilege8.8CriticalNoNo
CVE-2025-55227Microsoft SQL Server Elevation of Privilege VulnerabilityElevation of Privilege8.8ImportantNoNo
CVE-2025-54910Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution8.4CriticalNoNo
CVE-2025-49692Azure Connected Machine Agent Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-53800Windows Graphics Component Elevation of Privilege VulnerabilityElevation of Privilege7.8CriticalNoNo
CVE-2025-53801Microsoft DWM Core Library Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54091Windows Hyper-V Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54092Windows Hyper-V Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54098Windows Hyper-V Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54102Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54111Windows UI XAML Phone DatePickerFlyout Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54894Local Security Authority Subsystem Service Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54895SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54896Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54898Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54899Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54900Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54902Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54903Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54904Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54906Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54907Microsoft Office Visio Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54908Microsoft PowerPoint Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-54912Windows BitLocker Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54913Windows UI XAML Maps MapControlSettings Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-54916Windows NTFS Remote Code Execution VulnerabilityRemote Code Execution7.8ImportantNoNo
CVE-2025-55224Windows Hyper-V Remote Code Execution VulnerabilityRemote Code Execution7.8CriticalNoNo
CVE-2025-55228Windows Graphics Component Remote Code Execution VulnerabilityRemote Code Execution7.8CriticalNoNo
CVE-2025-55245Xbox Gaming Services Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-55316Azure Arc Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-55317Microsoft AutoUpdate (MAU) Elevation of Privilege VulnerabilityElevation of Privilege7.8ImportantNoNo
CVE-2025-53805HTTP.sys Denial of Service VulnerabilityDenial of Service7.5ImportantNoNo
CVE-2025-54919Windows Graphics Component Remote Code Execution VulnerabilityRemote Code Execution7.5ImportantNoNo
CVE-2025-55243Microsoft OfficePlus Spoofing VulnerabilitySpoofing7.5ImportantNoNo
CVE-2025-54103Windows Management Service Elevation of Privilege VulnerabilityElevation of Privilege7.4ImportantNoNo
CVE-2025-54116Windows MultiPoint Services Elevation of Privilege VulnerabilityElevation of Privilege7.3ImportantNoNo
CVE-2025-54911Windows BitLocker Elevation of Privilege VulnerabilityElevation of Privilege7.3ImportantNoNo
CVE-2025-55236Graphics Kernel Remote Code Execution VulnerabilityRemote Code Execution7.3CriticalNoNo
CVE-2025-54905Microsoft Word Information Disclosure VulnerabilityInformation Disclosure7.1ImportantNoNo
CVE-2025-49734PowerShell Direct Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-53802Windows Bluetooth Service Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-53807Windows Graphics Component Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-54093Windows TCP/IP Driver Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-54099Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-54105Microsoft Brokering File System Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-54108Capability Access Management Service (camsvc) Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-54112Microsoft Virtual Hard Disk Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-54114Windows Connected Devices Platform Service (Cdpsvc) Denial of Service VulnerabilityDenial of Service7.0ImportantNoNo
CVE-2025-54115Windows Hyper-V Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-55223DirectX Graphics Kernel Elevation of Privilege VulnerabilityElevation of Privilege7.0ImportantNoNo
CVE-2025-53808Windows Defender Firewall Service Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2025-53810Windows Defender Firewall Service Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2025-54094Windows Defender Firewall Service Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2025-54104Windows Defender Firewall Service Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2025-54109Windows Defender Firewall Service Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2025-54915Windows Defender Firewall Service Elevation of Privilege VulnerabilityElevation of Privilege6.7ImportantNoNo
CVE-2025-55226Graphics Kernel Remote Code Execution VulnerabilityRemote Code Execution6.7CriticalNoNo
CVE-2025-47997Microsoft SQL Server Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-53796Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-53797Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-53798Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-53806Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-53809Local Security Authority Subsystem Service (LSASS) Denial of Service VulnerabilityDenial of Service6.5ImportantNoNo
CVE-2025-54095Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-54096Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-54097Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-55225Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityInformation Disclosure6.5ImportantNoNo
CVE-2025-53799Windows Imaging Component Information Disclosure VulnerabilityInformation Disclosure5.5CriticalNoNo
CVE-2025-53803Windows Kernel Memory Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2025-53804Windows Kernel-Mode Driver Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2025-54901Microsoft Excel Information Disclosure VulnerabilityInformation Disclosure5.5ImportantNoNo
CVE-2025-54101Windows SMB Client Remote Code Execution VulnerabilityRemote Code Execution4.8ImportantNoNo
CVE-2025-53791Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilitySecurity Feature Bypass4.7ModerateNoNo
CVE-2025-54107MapUrlToZone Security Feature Bypass VulnerabilitySecurity Feature Bypass4.3ImportantNoNo
CVE-2025-54917MapUrlToZone Security Feature Bypass VulnerabilitySecurity Feature Bypass4.3ImportantNoNo

Retrospective vulnerability analysis

  • CVE-2025-27480 — Windows Remote Desktop Services Remote Code Execution Vulnerability (Remote Code Execution). This vulnerability is a classic stack buffer overflow. An attacker can send a specially crafted HTTP GET request longer than 256 bytes, causing a buffer overflow on the server. This enables arbitrary code execution on the target machine without requiring authentication or user interaction, potentially resulting in remote access (reverse shell). The vulnerability was fixed in April 2025.
  • CVE-2025-32713 — Windows Common Log File System Driver Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the CLFS file system driver that allows a local attacker to elevate privileges. The issue stems from improper handling of metadata in BLF (Base Log File) files, leading to kernel memory corruption. An attacker can craft a malicious CLFS file whose exploitation results in code execution with SYSTEM-level privileges. The vulnerability was fixed in June 2025.
  • CVE-2025-47987 — Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability (Elevation of Privilege). This vulnerability is an integer overflow that leads to a heap-based buffer overflow in tspkg.dll (Terminal Services Security Package). The issue occurs in the TSCreateKerbCertLogonBuffer function when processing authentication data, specifically certificate data. An attacker can craft an authentication request with a very large certificate length value. When calculating the total buffer size, an integer overflow occurs, causing a buffer much smaller than required to be allocated. A subsequent copy of the certificate data into this undersized buffer triggers a heap overflow, crashing lsass.exe and causing a denial of service. The vulnerability was fixed in July 2025.
  • CVE-2025-49667 — Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the Win32 kernel subsystem that allows a local user to elevate privileges to SYSTEM. The exploit triggers a vulnerable system call that forcibly frees an object in kernel memory twice, after which the attacker can overwrite a kernel function pointer and execute their code. A PoC demonstrating this technique is available on GitHub. The vulnerability was fixed in July 2025.
  • CVE-2025-50154 — Microsoft Windows File Explorer Spoofing Vulnerability (Spoofing). A vulnerability in Windows File Explorer that allows NTLMv2-SSP password hashes to be leaked without user interaction (zero-click). This is a bypass of a previous security fix. By creating a specially crafted shortcut (.LNK) that points to an executable on a remote SMB server, an attacker causes explorer.exe to automatically attempt to extract the icon from the remote file, which results in the NTLM hash being sent to the attacker's server. The vulnerability was fixed in August 2025.
  • CVE-2025-53773 — GitHub Copilot and Visual Studio Remote Code Execution Vulnerability (Remote Code Execution). A prompt injection vulnerability in GitHub Copilot within VS Code that leads to remote code execution. An attacker can embed an instruction into source code or other files that modifies the project configuration (.vscode/settings.json), enabling "YOLO mode" which disables all user confirmation prompts. This allows Copilot to run shell commands and perform other dangerous actions without the developer's knowledge. The vulnerability was fixed in August 2025.

Conclusion

The September 2025 security update, while less extensive than previous ones, is a critical release due to the presence of a publicly disclosed vulnerability and eight critical fixes. IT administrators need to act quickly and strategically. Priority should be given to immediately installing updates for the following vulnerabilities:

  • The publicly disclosed CVE-2025-55234 (Windows SMB, EoP) to prevent its imminent exploitation.
  • All 8 critical vulnerabilities, especially those affecting NTLM (CVE-2025-54918), Microsoft Office (CVE-2025-54910), Hyper-V (CVE-2025-55224) and graphics components, as they may lead to full system compromise.

It is also recommended to prioritize updating servers with RRAS, SQL Server, and SharePoint roles, given their critical role in enterprise infrastructure. Timely patching remains a key element of defense. Delays in installing updates, especially for publicly disclosed vulnerabilities, create an unacceptable level of risk to the organization's security.

Paranoid Security Bypassing KASLR in Windows: An attack on the mechanism of pre-selection May 6
Bypassing KASLR in Windows: An attack on the mechanism of pre-selection
Paranoid Security Analysis of Microsoft Patch Tuesday updates - April 2025 April 8
MS Patch Tuesday Analysis of Microsoft Patch Tuesday updates - April 2025
Paranoid Security MSR vulnerability manipulation: Full control February 1
MSR vulnerability manipulation: Full control