Analysis of Microsoft Patch Tuesday updates - December 2025
Executive Summary
On Tuesday, 09 December 2025, Microsoft released its monthly security patch addressing 57 vulnerabilities in its products.
By severity:
- Remote Code Execution - 19;
- Elevation of Privilege - 28;
- Spoofing - 3;
- Denial of Service - 3;
- Information Disclosure - 4.
Exploited (Zero-Days) and Publicly Disclosed Vulnerabilities
Special attention should be paid to the following 3 vulnerabilities. Fixing them is the highest priority:
- CVE-2025-54100 (CVSS 7.8; Remote Code Execution) - PowerShell Remote Code Execution Vulnerability (Remote Code Execution). A command-injection vulnerability in Windows PowerShell that allows arbitrary code execution on the target system. The issue lies in the web-content parsing mechanism used by the Invoke-WebRequest cmdlet (which by default uses the Internet Explorer engine), which may unintentionally execute malicious scripts embedded in a downloaded web page. User interaction is required for a successful attack.
- CVE-2025-62221 (CVSS 7.8; Elevation of Privilege) - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability (Elevation of Privilege). A Use-After-Free vulnerability in the Windows Cloud Files Mini Filter driver. Successful exploitation allows a local authenticated attacker to elevate privileges to SYSTEM.
- CVE-2025-64671 (CVSS 8.4; Remote Code Execution) - GitHub Copilot for Jetbrains Remote Code Execution Vulnerability (Remote Code Execution). A vulnerability that allows arbitrary code execution on the victim's local machine. The issue is classified as Command Injection and is exploited via the "Cross Prompt Injection" technique. An attacker can use untrusted files or MCP servers to add malicious instructions to commands that are allowed in the user's terminal auto-approval settings.
General overview and trends
December 2025 Patch Tuesday closes out the year with a mid-sized release: Microsoft fixed 57 vulnerabilities. By number of fixes, this month is comparable to November (63); however, the threat level remains high due to an actively exploited vulnerability and public disclosures. Key trends this month:
- The central event is the presence of three high-impact issues. A vulnerability in the Windows Cloud Files Mini Filter driver (CVE-2025-62221) is already being exploited in the wild for privilege escalation. In addition, exploitation details for the PowerShell and GitHub Copilot RCE vulnerabilities have been publicly disclosed, making them attractive targets for attackers in the coming days.
- A significant portion of the updates (more than 10 CVEs) addresses remote code execution (RCE) vulnerabilities in Microsoft Office products—Word, Excel, Outlook, and Access. This indicates a high risk of attacks via malicious documents and phishing campaigns targeting end users.
- System drivers and file systems: The trend of hardening the kernel and drivers continues. Privilege escalation vulnerabilities were fixed in ReFS, Projected File System, Storage VSP, and Cloud Files Mini Filter. Because these components operate at a low level, flaws in them are often used to fully take over a system after an initial compromise.
- Developer tools and AI security: Following previous months, Microsoft again fixes vulnerabilities in developer tooling. The RCE in GitHub Copilot for JetBrains (CVE-2025-64671) highlights a new attack vector through development environments (IDEs) and AI extensions that have access to sensitive code and internal networks.
Full List of Vulnerabilities
Below is a table with all vulnerabilities fixed this month.
| CVE | Title | Type | CVSS | Severity | Exploited | Publicly Disclosed |
|---|---|---|---|---|---|---|
| CVE-2025-64671 | GitHub Copilot for Jetbrains Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Remote Code Execution | No | Yes |
| CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | Yes |
| CVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | Yes | No |
| CVE-2025-62456 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Remote Code Execution | No | No |
| CVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Remote Code Execution | No | No |
| CVE-2025-62550 | Azure Monitor Agent Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Remote Code Execution | No | No |
| CVE-2025-64672 | Microsoft SharePoint Server Spoofing Vulnerability | Spoofing | 8.8 | Spoofing | No | No |
| CVE-2025-64678 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Remote Code Execution | 8.8 | Remote Code Execution | No | No |
| CVE-2025-62554 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Remote Code Execution | No | No |
| CVE-2025-62557 | Microsoft Office Remote Code Execution Vulnerability | Remote Code Execution | 8.4 | Remote Code Execution | No | No |
| CVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62458 | Win32k Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62552 | Microsoft Access Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62553 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62556 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62558 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62559 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62560 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62561 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62562 | Microsoft Outlook Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62563 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62564 | Microsoft Excel Remote Code Execution Vulnerability | Remote Code Execution | 7.8 | Remote Code Execution | No | No |
| CVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-62572 | Application Information Service Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-64679 | Windows DWM Core Library Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-64680 | Windows DWM Core Library Elevation of Privilege Vulnerability | Elevation of Privilege | 7.8 | Elevation of Privilege | No | No |
| CVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability | Elevation of Privilege | 7.5 | Elevation of Privilege | No | No |
| CVE-2025-64666 | Microsoft Exchange Server Elevation of Privilege Vulnerability | Elevation of Privilege | 7.5 | Elevation of Privilege | No | No |
| CVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability | Elevation of Privilege | 7.3 | Elevation of Privilege | No | No |
| CVE-2025-62570 | Windows Camera Frame Server Monitor Information Disclosure Vulnerability | Information Disclosure | 7.1 | Information Disclosure | No | No |
| CVE-2025-62469 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Elevation of Privilege | No | No |
| CVE-2025-62555 | Microsoft Word Remote Code Execution Vulnerability | Remote Code Execution | 7.0 | Remote Code Execution | No | No |
| CVE-2025-62569 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Elevation of Privilege | No | No |
| CVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | Elevation of Privilege | 7.0 | Elevation of Privilege | No | No |
| CVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability | Denial of Service | 6.5 | Denial of Service | No | No |
| CVE-2025-62465 | DirectX Graphics Kernel Denial of Service Vulnerability | Denial of Service | 6.5 | Denial of Service | No | No |
| CVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | Information Disclosure | 6.5 | Information Disclosure | No | No |
| CVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability | Information Disclosure | 6.5 | Information Disclosure | No | No |
| CVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability | Denial of Service | 5.3 | Denial of Service | No | No |
| CVE-2025-64667 | Microsoft Exchange Server Spoofing Vulnerability | Spoofing | 5.3 | Spoofing | No | No |
| CVE-2025-62468 | Windows Defender Firewall Service Information Disclosure Vulnerability | Information Disclosure | 4.4 | Information Disclosure | No | No |
| CVE-2025-62223 | Microsoft Edge (Chromium-based) for Mac Spoofing Vulnerability | Spoofing | 4.3 | Spoofing | No | No |
Retrospective vulnerability analysis
- CVE-2025-54914 — Azure Networking Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in Azure's networking infrastructure that allows creating malicious routes in virtual networks, potentially leading to traffic interception and bypass of security controls. A publicly available exploit exists for this vulnerability Azure Route Exploit with extended functionality for automation and stealth. Microsoft fixed the issue on the cloud infrastructure side in September 2025.
- CVE-2025-55241 — Azure Entra ID Elevation of Privilege Vulnerability (Elevation of Privilege). A critical vulnerability that could have compromised virtually any Entra ID tenant worldwide. The issue stemmed from a validation flaw in the legacy Azure AD Graph API: it did not verify that the tenant issuing the special "Actor token" (an inter-service communication token) matched the tenant being queried. This allowed an attacker, using a token from their own tenant, to act on behalf of any user—including Global Admin—in any other tenant, bypassing all security policies, including Conditional Access. Details were disclosed in a researcher's article titled "One Token to rule them all". Microsoft fixed the issue on its side in September 2025.
- CVE-2025-59501 — Microsoft Configuration Manager Spoofing Vulnerability (Spoofing). An authentication bypass vulnerability that occurs when integrated with Microsoft Entra ID. An attacker can change the User Principal Name (UPN) of a cloud account to impersonate an Active Directory user that is not synchronized to the cloud. Successful exploitation allows unauthorized access to the API
AdminServiceand elevate privileges to Full Administrator in the SCCM hierarchy. A PoC is available on GitHub PoC, which automates token acquisition and server takeover. The vulnerability was fixed in October 2025. - CVE-2025-60710 — Host Process for Windows Tasks Elevation of Privilege Vulnerability (Elevation of Privilege). A privilege escalation vulnerability affecting the Windows AI Recall component (the “Recall” feature). The issue is a logic flaw (Link Following) during directory cleanup by the Task Scheduler (
taskhostw.exe). The published PoC demonstrates the use of an undocumented WNF (Windows Notification Facility) mechanism to force a task to run and exploit a race condition using OpLock. This allows an attacker to redirect the deletion operation to an arbitrary system file and gain SYSTEM privileges. The vulnerability was fixed in November 2025. - CVE-2025-60719 — Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability (Elevation of Privilege). A vulnerability in the driver
afd.sys, responsible for the Winsock API, that allows a local attacker to elevate privileges to SYSTEM. The issue is a classic race condition leading to Use-After-Free when one thread requests socket information (for example, viaAfdGetInformation), while another thread closes it at the same time. Akamai researchers published a detailed technical analysis detailing the exploitation logic. The vulnerability was fixed in November 2025.
Conclusion
The December security update requires heightened vigilance from IT administrators despite the moderate overall number of patches. The presence of an actively exploited vulnerability and issues in widely used tools (PowerShell, Office) creates serious risks. Priority should be given to immediately installing updates for the following vulnerabilities:
- Actively exploited CVE-2025-62221 (Windows Cloud Files Mini Filter, EoP) to deny attackers a privilege-escalation path.
- Publicly disclosed CVE-2025-54100 (PowerShell, RCE) and CVE-2025-64671 (GitHub Copilot, RCE), since information on how to exploit them is already publicly available. The second wave of updates should cover user workstations with the installed Microsoft Office, to minimize the risks associated with opening malicious files. Also, do not forget about servers running RRAS, which remain a consistent target for RCE attacks. It is strongly recommended to review the section "Retrospective vulnerability analysis". The emergence of public exploits and detailed write-ups for critical vulnerabilities in Azure, SCCM and Windows Recall, patched in the fall, makes updating infrastructure a mandatory requirement to protect against attacks that leverage already known vectors.