BigTech CompaniesCybersecurityNewswireTechnology

Microsoft Patches 3 Zero-Days, 57 Flaws in December Update

▼ Summary

– Microsoft’s December 2025 Patch Tuesday fixes 57 flaws, including one actively exploited and two publicly disclosed zero-day vulnerabilities.
– The update addresses three “Critical” remote code execution vulnerabilities among 19 total RCE flaws.
– The actively exploited zero-day (CVE-2025-62221) is a privilege elevation bug in the Windows Cloud Files Mini Filter Driver.
– One publicly disclosed zero-day (CVE-2025-64671) is a command injection flaw in GitHub Copilot for Jetbrains.
– Another publicly disclosed zero-day (CVE-2025-54100) is a PowerShell vulnerability where scripts from a webpage could be executed via Invoke-WebRequest.

Microsoft’s December 2025 Patch Tuesday security release addresses a total of 57 distinct vulnerabilities, a critical monthly update for system administrators. This batch includes fixes for three zero-day flaws, with one confirmed as actively exploited by attackers and two others that were publicly disclosed prior to a patch being available. Among the resolved issues are three critical remote code execution vulnerabilities that demand immediate attention. The breakdown of the patched flaws includes 28 elevation of privilege vulnerabilities, 19 remote code execution bugs, 4 information disclosure issues, 3 denial of service flaws, and 2 spoofing vulnerabilities. It is important to note that this count pertains specifically to updates released on Patch Tuesday and does not include the 15 Microsoft Edge flaws or Mariner vulnerabilities patched earlier in the month.

The single actively exploited zero-day is tracked as CVE-2025-62221, a privilege elevation vulnerability in the Windows Cloud Files Mini Filter Driver. Microsoft describes it as a “use after free” flaw that permits an authorized attacker to elevate privileges locally, ultimately granting SYSTEM-level access. The Microsoft Threat Intelligence Center and Microsoft Security Response Center discovered the issue, though specific details on the exploitation methods have not been publicly shared.

The two publicly disclosed zero-days are also significant. The first, CVE-2025-64671, is a remote code execution vulnerability in GitHub Copilot for Jetbrains. This command injection flaw could allow an unauthorized attacker to execute code locally through a malicious Cross Prompt Injection in untrusted files or MCP servers. Researcher Ari Marzuk disclosed this vulnerability as part of a report on a novel class of AI IDE vulnerabilities. The second, CVE-2025-54100, is a PowerShell remote code execution vulnerability. It could cause scripts embedded in a webpage to be executed when the page is retrieved using the `Invoke-WebRequest` cmdlet. Microsoft has implemented a warning prompt that recommends using the `-UseBasicParsing` switch to prevent unintended code execution.

For organizations, applying these updates promptly is a fundamental security practice. Delays in patching can leave systems exposed to known exploits, particularly for the actively exploited zero-day and the critical remote code execution flaws in Microsoft Office components like Outlook. The comprehensive list of patched software is extensive, covering core Windows components, Microsoft Office applications, Azure services, Exchange Server, and development tools like GitHub Copilot.

A complete table of the resolved vulnerabilities, including their CVE identifiers, titles, and severity ratings, is provided below for detailed reference. This list enables IT teams to cross-reference their environments and prioritize deployments based on the specific products and services they operate. Consistent and timely application of these security updates remains the most effective defense against potential attacks leveraging these now-public vulnerabilities.

CVE Vulnerabilities Table

TagCVE IDCVE TitleSeverity
Application Information ServicesCVE-2025-62572Application Information Service Elevation of Privilege VulnerabilityImportant
Azure Monitor AgentCVE-2025-62550Azure Monitor Agent Remote Code Execution VulnerabilityImportant
CopilotCVE-2025-64671GitHub Copilot for Jetbrains Remote Code Execution VulnerabilityImportant
Microsoft Brokering File SystemCVE-2025-62569Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Brokering File SystemCVE-2025-62469Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2025-13634Chromium: CVE-2025-13634 Inappropriate implementation in DownloadsUnknown
Microsoft Edge (Chromium-based)CVE-2025-13721Chromium: CVE-2025-13721 Race in v8Unknown
Microsoft Edge (Chromium-based)CVE-2025-13630Chromium: CVE-2025-13630 Type Confusion in V8Unknown
Microsoft Edge (Chromium-based)CVE-2025-13631Chromium: CVE-2025-13631 Inappropriate implementation in Google UpdaterUnknown
Microsoft Edge (Chromium-based)CVE-2025-13632Chromium: CVE-2025-13632 Inappropriate implementation in DevToolsUnknown
Microsoft Edge (Chromium-based)CVE-2025-13633Chromium: CVE-2025-13633 Use after free in Digital CredentialsUnknown
Microsoft Edge (Chromium-based)CVE-2025-13638Chromium: CVE-2025-13638 Use after free in Media StreamUnknown
Microsoft Edge (Chromium-based)CVE-2025-13639Chromium: CVE-2025-13639 Inappropriate implementation in WebRTCUnknown
Microsoft Edge (Chromium-based)CVE-2025-13640Chromium: CVE-2025-13640 Inappropriate implementation in PasswordsUnknown
Microsoft Edge (Chromium-based)CVE-2025-13637Chromium: CVE-2025-13637 Inappropriate implementation in DownloadsUnknown
Microsoft Edge (Chromium-based)CVE-2025-13720Chromium: CVE-2025-13720 Bad cast in LoaderUnknown
Microsoft Edge (Chromium-based)CVE-2025-13635Chromium: CVE-2025-13635 Inappropriate implementation in DownloadsUnknown
Microsoft Edge (Chromium-based)CVE-2025-13636Chromium: CVE-2025-13636 Inappropriate implementation in Split ViewUnknown
Microsoft Edge for iOSCVE-2025-62223Microsoft Edge (Chromium-based) for Mac Spoofing VulnerabilityLow
Microsoft Exchange ServerCVE-2025-64666Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-64667Microsoft Exchange Server Spoofing VulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-64670Windows DirectX Information Disclosure VulnerabilityImportant
Microsoft OfficeCVE-2025-62554Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-62557Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft Office AccessCVE-2025-62552Microsoft Access Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-62560Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-62563Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-62561Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-62564Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-62553Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-62556Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office OutlookCVE-2025-62562Microsoft Outlook Remote Code Execution VulnerabilityCritical
Microsoft Office SharePointCVE-2025-64672Microsoft SharePoint Server Spoofing VulnerabilityImportant
Microsoft Office WordCVE-2025-62558Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-62559Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-62555Microsoft Word Remote Code Execution VulnerabilityImportant
Storvsp.sys DriverCVE-2025-64673Windows Storage VSP Driver Elevation of Privilege VulnerabilityImportant
Windows Camera Frame Server MonitorCVE-2025-62570Windows Camera Frame Server Monitor Information Disclosure VulnerabilityImportant
Windows Client-Side Caching (CSC) ServiceCVE-2025-62466Windows Client-Side Caching Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-62457Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-62454Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-62221Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2025-62470Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Defender Firewall ServiceCVE-2025-62468Windows Defender Firewall Service Information Disclosure VulnerabilityImportant
Windows DirectXCVE-2025-62463DirectX Graphics Kernel Denial of Service VulnerabilityImportant
Windows DirectXCVE-2025-62465DirectX Graphics Kernel Denial of Service VulnerabilityImportant
Windows DirectXCVE-2025-62573DirectX Graphics Kernel Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-64679Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-64680Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows Hyper-VCVE-2025-62567Windows Hyper-V Denial of Service VulnerabilityImportant
Windows InstallerCVE-2025-62571Windows Installer Elevation of Privilege VulnerabilityImportant
Windows Message QueuingCVE-2025-62455Microsoft Message Queuing (MSMQ) Elevation of Privilege VulnerabilityImportant
Windows PowerShellCVE-2025-54100PowerShell Remote Code Execution VulnerabilityImportant
Windows Projected File SystemCVE-2025-62464Windows Projected File System Elevation of Privilege VulnerabilityImportant
Windows Projected File SystemCVE-2025-55233Windows Projected File System Elevation of Privilege VulnerabilityImportant
Windows Projected File SystemCVE-2025-62462Windows Projected File System Elevation of Privilege VulnerabilityImportant
Windows Projected File SystemCVE-2025-62467Windows Projected File System Elevation of Privilege VulnerabilityImportant
Windows Projected File System Filter DriverCVE-2025-62461Windows Projected File System Elevation of Privilege VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2025-62474Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2025-62472Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Resilient File System (ReFS)CVE-2025-62456Windows Resilient File System (ReFS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-62549Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-62473Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-64678Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows ShellCVE-2025-62565Windows File Explorer Elevation of Privilege VulnerabilityImportant
Windows ShellCVE-2025-64661Windows Shell Elevation of Privilege VulnerabilityImportant
Windows

(Source: NewsAPI Tech Headlines)

Topics

patch tuesday 100% zero-day vulnerabilities 95% remote code execution 90% elevation of privilege 85% vulnerability categories 80% microsoft edge 75% GitHub Copilot 70% powershell security 65% windows components 60% microsoft office 55%