December, 2025: Patch Tuesday - Three Zero Days to End 2025

Welcome to my December Patch Tuesday newsletter.  We made it through 2025 and another year bites the dust.  Today Microsoft released just 56 updates and a long list of 216 additional updates for a total of 271 updates in the past 30 days. Wow, so let's get started.

We have three zero-day vulnerabilities to look at.

Our first zero day is CVE-2025-54100.  This remote code execution could allow an attacker via PowerShell to execute code locally.  Although being publicly disclosed, exploitation in the wild has not been detected.  The fix for this vulnerability was released today.  

Next is CVE-2025-62221. This elevation of privilege is currently being exploited and could allow a successful attacker to gain SYSTEM privileges.

Our third and final zero day is CVE-2025-64671.  This remote code execution is  publicly disclosed and has a max severity the same as our other two zero days; important.  Despite this lower rating you will want to get these pushed out ASAP.

This is our last PT newsletter for 2025 so I'll keep this one short and sweet.  Be sure to check out the chart below to see if any of the affect products are in your environment.  
Besides that it is a pretty normal month.  Below the chart you will find a long list of Azure Linux and CBL Mariner products and versions.  I didn't want to "clog up" the chart with all that data so I put it below the chart.  See you next month!

So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month.

Patch data provided by:

LOGbinder.com

Technology

Products Affected

Severity

Reference

Workaround/ Exploited / Publicly Disclosed

Vulnerability Info

Windows

Windows 10, 11

Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2025 including Server Core Installations

MS 365 Defender Portal

Critical

CVE-2025-54100**
CVE-2025-55233
CVE-2025-59516
CVE-2025-59517
CVE-2025-62221*
CVE-2025-62454
CVE-2025-62455
CVE-2025-62456
CVE-2025-62457
CVE-2025-62458
CVE-2025-62459
CVE-2025-62461
CVE-2025-62462
CVE-2025-62463
CVE-2025-62464
CVE-2025-62465
CVE-2025-62466
CVE-2025-62467
CVE-2025-62468
CVE-2025-62469
CVE-2025-62470
CVE-2025-62472
CVE-2025-62473
CVE-2025-62474
CVE-2025-62549
CVE-2025-62565
CVE-2025-62567
CVE-2025-62569
CVE-2025-62570
CVE-2025-62571
CVE-2025-62572
CVE-2025-62573
CVE-2025-64658
CVE-2025-64661
CVE-2025-64666
CVE-2025-64667
CVE-2025-64670
CVE-2025-64673
CVE-2025-64678
CVE-2025-64679
CVE-2025-64680

Workaround: No
Exploited: Yes*
Public: Yes**

Denial of Service

Elevation of Privilege

Information Disclosure

Remote Code Execution

Spoofing

Exchange Server

2016 CU 23

2019 CU 14, 15

Subscription Edition RTM

Important

CVE-2025-64666
CVE-2025-64667

Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Spoofing

Edge

Chromium-based

Low

CVE-2025-13042
CVE-2025-13223
CVE-2025-13224
CVE-2025-13630
CVE-2025-13631
CVE-2025-13632
CVE-2025-13633
CVE-2025-13634
CVE-2025-13635
CVE-2025-13636
CVE-2025-13637
CVE-2025-13638
CVE-2025-13639
CVE-2025-13640
CVE-2025-13720
CVE-2025-13721
CVE-2025-62223

Workaround: No
Exploited: No
Public: No

Spoofing

Office

365 Apps for Enterprise

Access, Excel, Word 2016

Office 2016, 2019

LTSC 2021, 2024 including for Mac

Office for Android

Office Online Server

Critical

CVE-2025-62552
CVE-2025-62553
CVE-2025-62554
CVE-2025-62555
CVE-2025-62556
CVE-2025-62557
CVE-2025-62558
CVE-2025-62559
CVE-2025-62560
CVE-2025-62561
CVE-2025-62562
CVE-2025-62563
CVE-2025-62564

Workaround: No
Exploited: No
Public: No

Remote Code Execution

SharePoint

Enterprise Server 2016

Server 2019

Server Subscription Edition

SharePoint Online

Critical

CVE-2025-59245
CVE-2025-62555
CVE-2025-62558
CVE-2025-62559
CVE-2025-62562
CVE-2025-64672

Workaround: No
Exploited: No
Public: No
Remote Code Execution

Spoofing

Azure

App Gateway

Bastion Developer

Monitor Agent

Monitor Control Service

Critical

CVE-2025-49752
CVE-2025-62207
CVE-2025-62550
CVE-2025-64656
CVE-2025-64657

Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Remote Code Execution

Developer Tools

Visual Studio Code

Important

CVE-2025-64660

Workaround: No
Exploited: No
Public: No

Remote Code Execution

Open Source Software

*See more products and versions below chart

Critical

CVE-2011-10034
CVE-2022-49932
CVE-2022-49935
CVE-2022-49961
CVE-2022-49980
CVE-2022-50015
CVE-2022-50070
CVE-2022-50071
CVE-2022-50073
CVE-2022-50116
CVE-2022-50166
CVE-2022-50167
CVE-2022-50224
CVE-2022-50233
CVE-2022-50256
CVE-2022-50260
CVE-2022-50266
CVE-2022-50303
CVE-2022-50304
CVE-2022-50316
CVE-2022-50350
CVE-2023-53037
CVE-2023-53042
CVE-2023-53068
CVE-2023-53074
CVE-2023-53093
CVE-2023-53149
CVE-2023-53152
CVE-2023-53178
CVE-2023-53187
CVE-2023-53209
CVE-2023-53218
CVE-2023-53221
CVE-2023-53231
CVE-2023-53240
CVE-2023-53247
CVE-2023-53248
CVE-2023-53254
CVE-2023-53261
CVE-2023-53292
CVE-2023-53749
CVE-2024-47866
CVE-2024-6485
CVE-2025-10158
CVE-2025-11230
CVE-2025-11731
CVE-2025-12084
CVE-2025-12385
CVE-2025-12638
CVE-2025-12748
CVE-2025-12816
CVE-2025-12817
CVE-2025-12818
CVE-2025-12819
CVE-2025-12969
CVE-2025-12970
CVE-2025-12977
CVE-2025-13193
CVE-2025-13226
CVE-2025-13227
CVE-2025-13230
CVE-2025-13601
CVE-2025-13836
CVE-2025-13837
CVE-2025-2998
CVE-2025-34297
CVE-2025-37820
CVE-2025-37945
CVE-2025-38656
CVE-2025-40110
CVE-2025-40111
CVE-2025-40135
CVE-2025-40139
CVE-2025-40146
CVE-2025-40149
CVE-2025-40158
CVE-2025-40164
CVE-2025-40167
CVE-2025-40168
CVE-2025-40170
CVE-2025-40173
CVE-2025-40176
CVE-2025-40178
CVE-2025-40179
CVE-2025-40180
CVE-2025-40187
CVE-2025-40190
CVE-2025-40192
CVE-2025-40193
CVE-2025-40194
CVE-2025-40195
CVE-2025-40197
CVE-2025-40198
CVE-2025-40200
CVE-2025-40201
CVE-2025-40202
CVE-2025-40204
CVE-2025-40205
CVE-2025-40206
CVE-2025-40207
CVE-2025-40210
CVE-2025-40211
CVE-2025-40215
CVE-2025-40217
CVE-2025-40218
CVE-2025-40219
CVE-2025-40220
CVE-2025-40223
CVE-2025-40233
CVE-2025-40240
CVE-2025-40242
CVE-2025-40243
CVE-2025-40244
CVE-2025-40245
CVE-2025-40247
CVE-2025-40248
CVE-2025-40250
CVE-2025-40251
CVE-2025-40252
CVE-2025-40253
CVE-2025-40254
CVE-2025-40257
CVE-2025-40258
CVE-2025-40259
CVE-2025-40261
CVE-2025-40262
CVE-2025-40263
CVE-2025-40264
CVE-2025-40266
CVE-2025-40268
CVE-2025-40269
CVE-2025-40272
CVE-2025-40273
CVE-2025-40275
CVE-2025-40277
CVE-2025-40279
CVE-2025-40280
CVE-2025-40281
CVE-2025-40282
CVE-2025-40283
CVE-2025-40284
CVE-2025-40287
CVE-2025-40288
CVE-2025-40289
CVE-2025-40292
CVE-2025-40294
CVE-2025-40297
CVE-2025-40301
CVE-2025-40303
CVE-2025-40304
CVE-2025-40305
CVE-2025-40308
CVE-2025-40310
CVE-2025-40311
CVE-2025-40319
CVE-2025-40321
CVE-2025-40322
CVE-2025-40323
CVE-2025-40324
CVE-2025-47913
CVE-2025-54770
CVE-2025-54771
CVE-2025-58436
CVE-2025-59775
CVE-2025-59777
CVE-2025-60876
CVE-2025-61661
CVE-2025-61662
CVE-2025-61663
CVE-2025-61664
CVE-2025-61727
CVE-2025-61729
CVE-2025-61915
CVE-2025-62689
CVE-2025-64324
CVE-2025-64505
CVE-2025-64506
CVE-2025-64704
CVE-2025-64713
CVE-2025-64720
CVE-2025-65018
CVE-2025-65082
CVE-2025-65637
CVE-2025-66030
CVE-2025-66031
CVE-2025-66200
CVE-2025-66221
CVE-2025-66293
CVE-2025-66382
CVE-2025-66476

Workaround: No
Exploited: No
Public: No

N/A

Dynamics

OmniChannel SDK Storage Containers

Critical

CVE-2025-64655

Workaround: No
Exploited: No
Public: No

Elevation of Privilege

Other

GitHub Copilot Plugin for JetBrains IDEs

Important

CVE-2025-64671**

Workaround: No
Exploited: No
Public: Yes**

Remote Code Execution

I didn't want to overflow the chart with the products and versions in this month's release for "Open Source Software".  Below is a list of products and versions included:  

Azure Linux:
azl3 autogen 5.18.16-9, azl3 busybox 1.36.1-18, azl3 busybox 1.36.1-19, azl3 ceph 18.2.2-11, azl3 containerized-data-importer 1.57.0-17, azl3 cups 2.4.13-1, azl3 cups 2.4.16-1, azl3 dcos-cli 1.2.0-19, azl3 docker-buildx 0.14.0-7, azl3 expat 2.6.4-2, azl3 flannel 0.24.2-21, azl3 fluent-bit 3.1.10-2, azl3 fluent-bit 3.1.9-6, azl3 glib 2.78.6-4, azl3 golang 1.23.12-1, azl3 golang 1.25.3-1, azl3 golang 1.25.5-1, azl3 grub2 2.06-25, azl3 haproxy 2.9.11-4, azl3 httpd 2.4.65-1, azl3 influxdb 2.7.5-8, azl3 kata-containers 3.19.1.kata2-2, azl3 kata-containers-cc 3.15.0.aks0-5, azl3 keras 3.3.3-5, azl3 kernel 6.6.112.1-2, azl3 kernel 6.6.116.1-1, azl3 kernel 6.6.117.1-1, azl3 kubernetes 1.30.10-16, azl3 kubevirt 1.5.0-5, azl3 kubevirt 1.5.3-2, azl3 libmicrohttpd 0.9.77-3, azl3 libpng 1.6.40-1, azl3 libvirt 10.0.0-5, azl3 libvirt 10.0.0-6, azl3 libxslt 1.1.43-3, azl3 nodejs 20.14.0-10, azl3 nodejs 20.14.0-9, azl3 packer 1.9.5-10, azl3 pgbouncer 1.24.1-1, azl3 postgresql 16.10-1, azl3 python3 3.12.9-5, azl3 python3 3.12.9-6, azl3 python-tensorboard 2.16.2-6, azl3 qtdeclarative 6.6.1-1, azl3 rsync 3.4.1-2, azl3 vim 9.1.1616-1

CBL Mariner:
cbl2 busybox 1.35.0-14, cbl2 ceph 16.2.10-10, cbl2 ceph 16.2.10-11, cbl2 cert-manager 1.11.2-24, cbl2 cf-cli 8.4.0-25, cbl2 cni-plugins 1.3.0-9, cbl2 containerized-data-importer 1.55.0-26, cbl2 cri-o 1.22.3-17, cbl2 cups 2.3.3op2-10, cbl2 dcos-cli 1.2.0-22, cbl2 flannel 0.14.0-26, cbl2 fluent-bit 3.0.6-4, cbl2 gcc 11.2.0-9, cbl2 glib 2.71.0-7, cbl2 golang 1.18.8-10, cbl2 golang 1.22.7-5, cbl2 grub2 2.06-15, cbl2 haproxy 2.4.24-2, cbl2 httpd 2.4.65-1, cbl2 influxdb 2.6.1-24, cbl2 jx 3.2.236-23, cbl2 kata-containers 3.2.0.azl2-7, cbl2 kata-containers-cc 3.2.0.azl2-8, cbl2 kernel 5.15.186.1-1, cbl2 kubernetes 1.28.4-19, cbl2 kube-vip-cloud-provider 0.0.2-23, cbl2 kubevirt 0.59.0-30, cbl2 kubevirt 0.59.0-31, cbl2 libcontainers-common 20210626-7, cbl2 libpng 1.6.51-1, cbl2 libvirt 7.10.0-10, cbl2 libxslt 1.1.34-8, cbl2 libxslt 1.1.34-9, cbl2 local-path-provisioner 0.0.21-19, cbl2 moby-buildx 0.7.1-26, cbl2 moby-compose 2.17.3-11, cbl2 moby-compose 2.17.3-12, cbl2 msft-golang 1.24.11-1, cbl2 msft-golang 1.24.9-1, cbl2 nodejs18 18.20.3-10, cbl2 nodejs18 18.20.3-9, cbl2 packer 1.9.5-15, cbl2 pgbouncer 1.24.1-1, cbl2 postgresql 14.19-1, cbl2 prometheus 2.37.9-5, cbl2 python3 3.9.19-16, cbl2 python3 3.9.19-17, cbl2 python-tensorboard 2.11.0-3, cbl2 pytorch 2.0.0-9, cbl2 qt5-qtbase 5.12.11-18, cbl2 qt5-qtdeclarative 5.12.5-5, cbl2 reaper 3.1.1-19, cbl2 reaper 3.1.1-21, cbl2 rsync 3.4.1-2, cbl2 tensorflow 2.11.1-2, cbl2 vim 9.1.1616-1