Webinar Library
Welcome to my December Patch Tuesday newsletter. We made it through 2025 and another year bites the dust. Today Microsoft released just 56 updates and a long list of 216 additional updates for a total of 271 updates in the past 30 days. Wow, so let's get started. We have three zero-day vulnerabilities to look at. Our first zero day is CVE-2025-54100. This remote code execution could allow an attacker via PowerShell to execute code locally. Although being publicly disclosed, exploitation in the wild has not been detected. The fix for this vulnerability was released today. Next is CVE-2025-62221. This elevation of privilege is currently being exploited and could allow a successful attacker to gain SYSTEM privileges. Our third and final zero day is CVE-2025-64671. This remote code execution is publicly disclosed and has a max severity the same as our other two zero days; important. Despite this lower rating you will want to get these pushed out ASAP. This is our last PT newsletter for 2025 so I'll keep this one short and sweet. Be sure to check out the chart below to see if any of the affect products are in your environment. Besides that it is a pretty normal month. Below the chart you will find a long list of Azure Linux and CBL Mariner products and versions. I didn't want to "clog up" the chart with all that data so I put it below the chart. See you next month!
So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month.
Patch data provided by:
Technology
Products Affected
Severity
Reference
Workaround/ Exploited / Publicly Disclosed
Vulnerability Info
Windows
Windows 10, 11
Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2025 including Server Core Installations MS 365 Defender Portal
Critical
CVE-2025-54100** CVE-2025-55233 CVE-2025-59516 CVE-2025-59517 CVE-2025-62221* CVE-2025-62454 CVE-2025-62455 CVE-2025-62456 CVE-2025-62457 CVE-2025-62458 CVE-2025-62459 CVE-2025-62461 CVE-2025-62462 CVE-2025-62463 CVE-2025-62464 CVE-2025-62465 CVE-2025-62466 CVE-2025-62467 CVE-2025-62468 CVE-2025-62469 CVE-2025-62470 CVE-2025-62472 CVE-2025-62473 CVE-2025-62474 CVE-2025-62549 CVE-2025-62565 CVE-2025-62567 CVE-2025-62569 CVE-2025-62570 CVE-2025-62571 CVE-2025-62572 CVE-2025-62573 CVE-2025-64658 CVE-2025-64661 CVE-2025-64666 CVE-2025-64667 CVE-2025-64670 CVE-2025-64673 CVE-2025-64678 CVE-2025-64679 CVE-2025-64680
Denial of Service Elevation of Privilege Information Disclosure Remote Code Execution Spoofing
Exchange Server
2016 CU 23 2019 CU 14, 15 Subscription Edition RTM
Important
CVE-2025-64666 CVE-2025-64667
Workaround: No Exploited: No Public: No
Edge
Chromium-based
Low
CVE-2025-13042 CVE-2025-13223 CVE-2025-13224 CVE-2025-13630 CVE-2025-13631 CVE-2025-13632 CVE-2025-13633 CVE-2025-13634 CVE-2025-13635 CVE-2025-13636 CVE-2025-13637 CVE-2025-13638 CVE-2025-13639 CVE-2025-13640 CVE-2025-13720 CVE-2025-13721 CVE-2025-62223
Office
365 Apps for Enterprise Access, Excel, Word 2016 Office 2016, 2019 LTSC 2021, 2024 including for Mac Office for Android Office Online Server
CVE-2025-62552 CVE-2025-62553 CVE-2025-62554 CVE-2025-62555 CVE-2025-62556 CVE-2025-62557 CVE-2025-62558 CVE-2025-62559 CVE-2025-62560 CVE-2025-62561 CVE-2025-62562 CVE-2025-62563 CVE-2025-62564
Remote Code Execution
SharePoint
Enterprise Server 2016 Server 2019 Server Subscription Edition SharePoint Online
CVE-2025-59245 CVE-2025-62555 CVE-2025-62558 CVE-2025-62559 CVE-2025-62562 CVE-2025-64672
Azure
App Gateway Bastion Developer Monitor Agent Monitor Control Service
CVE-2025-49752 CVE-2025-62207 CVE-2025-62550 CVE-2025-64656 CVE-2025-64657
Developer Tools
Visual Studio Code
CVE-2025-64660
Open Source Software
*See more products and versions below chart
CVE-2011-10034 CVE-2022-49932 CVE-2022-49935 CVE-2022-49961 CVE-2022-49980 CVE-2022-50015 CVE-2022-50070 CVE-2022-50071 CVE-2022-50073 CVE-2022-50116 CVE-2022-50166 CVE-2022-50167 CVE-2022-50224 CVE-2022-50233 CVE-2022-50256 CVE-2022-50260 CVE-2022-50266 CVE-2022-50303 CVE-2022-50304 CVE-2022-50316 CVE-2022-50350 CVE-2023-53037 CVE-2023-53042 CVE-2023-53068 CVE-2023-53074 CVE-2023-53093 CVE-2023-53149 CVE-2023-53152 CVE-2023-53178 CVE-2023-53187 CVE-2023-53209 CVE-2023-53218 CVE-2023-53221 CVE-2023-53231 CVE-2023-53240 CVE-2023-53247 CVE-2023-53248 CVE-2023-53254 CVE-2023-53261 CVE-2023-53292 CVE-2023-53749 CVE-2024-47866 CVE-2024-6485 CVE-2025-10158 CVE-2025-11230 CVE-2025-11731 CVE-2025-12084 CVE-2025-12385 CVE-2025-12638 CVE-2025-12748 CVE-2025-12816 CVE-2025-12817 CVE-2025-12818 CVE-2025-12819 CVE-2025-12969 CVE-2025-12970 CVE-2025-12977 CVE-2025-13193 CVE-2025-13226 CVE-2025-13227 CVE-2025-13230 CVE-2025-13601 CVE-2025-13836 CVE-2025-13837 CVE-2025-2998 CVE-2025-34297 CVE-2025-37820 CVE-2025-37945 CVE-2025-38656 CVE-2025-40110 CVE-2025-40111 CVE-2025-40135 CVE-2025-40139 CVE-2025-40146 CVE-2025-40149 CVE-2025-40158 CVE-2025-40164 CVE-2025-40167 CVE-2025-40168 CVE-2025-40170 CVE-2025-40173 CVE-2025-40176 CVE-2025-40178 CVE-2025-40179 CVE-2025-40180 CVE-2025-40187 CVE-2025-40190 CVE-2025-40192 CVE-2025-40193 CVE-2025-40194 CVE-2025-40195 CVE-2025-40197 CVE-2025-40198 CVE-2025-40200 CVE-2025-40201 CVE-2025-40202 CVE-2025-40204 CVE-2025-40205 CVE-2025-40206 CVE-2025-40207 CVE-2025-40210 CVE-2025-40211 CVE-2025-40215 CVE-2025-40217 CVE-2025-40218 CVE-2025-40219 CVE-2025-40220 CVE-2025-40223 CVE-2025-40233 CVE-2025-40240 CVE-2025-40242 CVE-2025-40243 CVE-2025-40244 CVE-2025-40245 CVE-2025-40247 CVE-2025-40248 CVE-2025-40250 CVE-2025-40251 CVE-2025-40252 CVE-2025-40253 CVE-2025-40254 CVE-2025-40257 CVE-2025-40258 CVE-2025-40259 CVE-2025-40261 CVE-2025-40262 CVE-2025-40263 CVE-2025-40264 CVE-2025-40266 CVE-2025-40268 CVE-2025-40269 CVE-2025-40272 CVE-2025-40273 CVE-2025-40275 CVE-2025-40277 CVE-2025-40279 CVE-2025-40280 CVE-2025-40281 CVE-2025-40282 CVE-2025-40283 CVE-2025-40284 CVE-2025-40287 CVE-2025-40288 CVE-2025-40289 CVE-2025-40292 CVE-2025-40294 CVE-2025-40297 CVE-2025-40301 CVE-2025-40303 CVE-2025-40304 CVE-2025-40305 CVE-2025-40308 CVE-2025-40310 CVE-2025-40311 CVE-2025-40319 CVE-2025-40321 CVE-2025-40322 CVE-2025-40323 CVE-2025-40324 CVE-2025-47913 CVE-2025-54770 CVE-2025-54771 CVE-2025-58436 CVE-2025-59775 CVE-2025-59777 CVE-2025-60876 CVE-2025-61661 CVE-2025-61662 CVE-2025-61663 CVE-2025-61664 CVE-2025-61727 CVE-2025-61729 CVE-2025-61915 CVE-2025-62689 CVE-2025-64324 CVE-2025-64505 CVE-2025-64506 CVE-2025-64704 CVE-2025-64713 CVE-2025-64720 CVE-2025-65018 CVE-2025-65082 CVE-2025-65637 CVE-2025-66030 CVE-2025-66031 CVE-2025-66200 CVE-2025-66221 CVE-2025-66293 CVE-2025-66382 CVE-2025-66476
N/A
Dynamics
OmniChannel SDK Storage Containers
CVE-2025-64655
Elevation of Privilege
Other
GitHub Copilot Plugin for JetBrains IDEs
CVE-2025-64671**
I didn't want to overflow the chart with the products and versions in this month's release for "Open Source Software". Below is a list of products and versions included: Azure Linux: azl3 autogen 5.18.16-9, azl3 busybox 1.36.1-18, azl3 busybox 1.36.1-19, azl3 ceph 18.2.2-11, azl3 containerized-data-importer 1.57.0-17, azl3 cups 2.4.13-1, azl3 cups 2.4.16-1, azl3 dcos-cli 1.2.0-19, azl3 docker-buildx 0.14.0-7, azl3 expat 2.6.4-2, azl3 flannel 0.24.2-21, azl3 fluent-bit 3.1.10-2, azl3 fluent-bit 3.1.9-6, azl3 glib 2.78.6-4, azl3 golang 1.23.12-1, azl3 golang 1.25.3-1, azl3 golang 1.25.5-1, azl3 grub2 2.06-25, azl3 haproxy 2.9.11-4, azl3 httpd 2.4.65-1, azl3 influxdb 2.7.5-8, azl3 kata-containers 3.19.1.kata2-2, azl3 kata-containers-cc 3.15.0.aks0-5, azl3 keras 3.3.3-5, azl3 kernel 6.6.112.1-2, azl3 kernel 6.6.116.1-1, azl3 kernel 6.6.117.1-1, azl3 kubernetes 1.30.10-16, azl3 kubevirt 1.5.0-5, azl3 kubevirt 1.5.3-2, azl3 libmicrohttpd 0.9.77-3, azl3 libpng 1.6.40-1, azl3 libvirt 10.0.0-5, azl3 libvirt 10.0.0-6, azl3 libxslt 1.1.43-3, azl3 nodejs 20.14.0-10, azl3 nodejs 20.14.0-9, azl3 packer 1.9.5-10, azl3 pgbouncer 1.24.1-1, azl3 postgresql 16.10-1, azl3 python3 3.12.9-5, azl3 python3 3.12.9-6, azl3 python-tensorboard 2.16.2-6, azl3 qtdeclarative 6.6.1-1, azl3 rsync 3.4.1-2, azl3 vim 9.1.1616-1 CBL Mariner: cbl2 busybox 1.35.0-14, cbl2 ceph 16.2.10-10, cbl2 ceph 16.2.10-11, cbl2 cert-manager 1.11.2-24, cbl2 cf-cli 8.4.0-25, cbl2 cni-plugins 1.3.0-9, cbl2 containerized-data-importer 1.55.0-26, cbl2 cri-o 1.22.3-17, cbl2 cups 2.3.3op2-10, cbl2 dcos-cli 1.2.0-22, cbl2 flannel 0.14.0-26, cbl2 fluent-bit 3.0.6-4, cbl2 gcc 11.2.0-9, cbl2 glib 2.71.0-7, cbl2 golang 1.18.8-10, cbl2 golang 1.22.7-5, cbl2 grub2 2.06-15, cbl2 haproxy 2.4.24-2, cbl2 httpd 2.4.65-1, cbl2 influxdb 2.6.1-24, cbl2 jx 3.2.236-23, cbl2 kata-containers 3.2.0.azl2-7, cbl2 kata-containers-cc 3.2.0.azl2-8, cbl2 kernel 5.15.186.1-1, cbl2 kubernetes 1.28.4-19, cbl2 kube-vip-cloud-provider 0.0.2-23, cbl2 kubevirt 0.59.0-30, cbl2 kubevirt 0.59.0-31, cbl2 libcontainers-common 20210626-7, cbl2 libpng 1.6.51-1, cbl2 libvirt 7.10.0-10, cbl2 libxslt 1.1.34-8, cbl2 libxslt 1.1.34-9, cbl2 local-path-provisioner 0.0.21-19, cbl2 moby-buildx 0.7.1-26, cbl2 moby-compose 2.17.3-11, cbl2 moby-compose 2.17.3-12, cbl2 msft-golang 1.24.11-1, cbl2 msft-golang 1.24.9-1, cbl2 nodejs18 18.20.3-10, cbl2 nodejs18 18.20.3-9, cbl2 packer 1.9.5-15, cbl2 pgbouncer 1.24.1-1, cbl2 postgresql 14.19-1, cbl2 prometheus 2.37.9-5, cbl2 python3 3.9.19-16, cbl2 python3 3.9.19-17, cbl2 python-tensorboard 2.11.0-3, cbl2 pytorch 2.0.0-9, cbl2 qt5-qtbase 5.12.11-18, cbl2 qt5-qtdeclarative 5.12.5-5, cbl2 reaper 3.1.1-19, cbl2 reaper 3.1.1-21, cbl2 rsync 3.4.1-2, cbl2 tensorflow 2.11.1-2, cbl2 vim 9.1.1616-1