Microsoft Patches 172 Flaws, Including Three Actively Exploited Zero-Days

Microsoft's October 2025 Patch Tuesday Addresses Over 172 Vulnerabilities, Three Zero-Days, and Critical WSUS Flaw

CRITICAL
October 17, 2025
October 19, 2025
5m read
Patch ManagementVulnerabilitySecurity Operations

Related Entities(initial)

Organizations

Products & Tech

Windows 10Windows 11Windows Server Update Service Windows Remote Access Connection ManagerAgere ModemIGEL OSAzure

CVE Identifiers

CVE-2025-24990
HIGH
CVSS:7.8
CVE-2025-59230
HIGH
CVSS:7.8
CVE-2025-47827
MEDIUM
CVSS:4.6
CVE-2025-24052
HIGH
CVSS:7.8
CVE-2025-59287
CRITICAL
CVSS:9.8

Full Report(when first published)

Executive Summary

Microsoft's October 2025 Patch Tuesday is a critical security event, addressing a massive volume of over 172 vulnerabilities. The update's urgency is driven by the active exploitation of three zero-day vulnerabilities, including a privilege escalation flaw (CVE-2025-59230) added to the CISA KEV catalog. Furthermore, a critical, unauthenticated Remote Code Execution (RCE) vulnerability (CVE-2025-59287) in the Windows Server Update Service (WSUS) poses a severe risk to enterprise patching infrastructure. This release also signifies the end-of-life for Windows 10 security updates, mandating a strategic shift to Windows 11 for continued protection. Security leaders must prioritize the immediate deployment of these patches, focusing on internet-facing systems, domain controllers, and WSUS servers.


Vulnerability Details

This month's Patch Tuesday addresses a wide array of flaws, but several stand out due to their severity and active exploitation.

Actively Exploited Zero-Day Vulnerabilities

  1. CVE-2025-59230 - Windows Remote Access Connection Manager (RasMan) Elevation of Privilege: This high-severity (CVSS 7.8) vulnerability allows a local attacker who is already authenticated to elevate their privileges to SYSTEM. This gives an attacker complete control over a compromised machine, making it a valuable link in an attack chain for lateral movement and persistence. Its confirmed use in the wild led CISA to add it to the KEV catalog.

  2. CVE-2025-24990 - Agere Modem Driver Elevation of Privilege: An unusual vulnerability in a legacy third-party modem driver bundled with Windows for two decades. Microsoft's fix was to completely remove the driver (agrsms.sys) from the OS, which also remediated a second publicly disclosed flaw, CVE-2025-24052. This may impact legacy hardware relying on fax modem capabilities.

  3. CVE-2025-47827 - IGEL OS Secure Boot Bypass: This flaw affects the Linux-based IGEL OS used in thin client environments. A Secure Boot bypass allows an attacker to load an untrusted operating system or kernel, subverting a fundamental platform security control.

Critical RCE Vulnerability

CVE-2025-59287 - Windows Server Update Service (WSUS) Remote Code Execution: This is arguably the most critical vulnerability patched this month. With a CVSS score of 9.8, it allows a remote, unauthenticated attacker to execute arbitrary code on a WSUS server. As WSUS servers are highly trusted and have privileged access to distribute updates across an entire enterprise network, their compromise could lead to a catastrophic supply chain attack within an organization.


Affected Systems

  • Operating Systems: Windows 10 (all versions, final update), Windows 11, Windows Server (multiple versions)
  • Services: Windows Server Update Service (WSUS), Windows Remote Access Connection Manager (RasMan)
  • Drivers: Agere Modem Driver (now removed)
  • Applications: Microsoft Office, Microsoft Excel
  • Cloud Services: Azure Compute Gallery

Impact Assessment

  • WSUS Compromise: An attacker exploiting CVE-2025-59287 could gain full control of a WSUS server. This would allow them to push malicious updates to all clients, effectively compromising the entire network in a single stroke. This represents a critical internal supply chain risk.
  • Privilege Escalation: The exploitation of CVE-2025-59230 allows attackers who have already gained an initial foothold (e.g., via phishing) to escalate to full administrative rights, bypassing security controls and establishing persistence.
  • Windows 10 End of Life: Organizations still running Windows 10 will no longer receive security updates, leaving them permanently vulnerable to any new flaws discovered after this patch. This creates significant compliance and security risks.

Cyber Observables for Detection

Type Value Description
file_name agrsms.sys The legacy Agere modem driver file. Its presence on systems post-patching indicates a failed update.
process_name svchost.exe -k netsvcs The parent process for RasMan. Monitor for anomalous child processes or network connections originating from it, which could indicate exploitation of CVE-2025-59230.
url_pattern /ClientWebService/client.asmx A common endpoint for WSUS. Monitor web logs on WSUS servers for unusual or malformed requests to this and other WSUS-related URLs.
event_id 4688 (Windows Security Log) Monitor for suspicious process creation events where a low-privileged user spawns a process running with SYSTEM integrity, potentially indicating successful privilege escalation.

Detection & Response

  • Vulnerability Scanning: Run authenticated scans against all Windows assets to identify missing patches for the October update, prioritizing the detection of the vulnerabilities listed above.
  • EDR/SIEM Queries:
    • Hunt for command-line activity related to the RasMan service (RasMan) or processes running under its parent svchost.exe instance that exhibit suspicious behavior (e.g., executing powershell.exe or cmd.exe).
    • Create alerts for any external network connections to your WSUS servers on ports 8530 or 8531 that do not originate from known Microsoft IP ranges or upstream WSUS servers.
  • Log Analysis (D3-NTA: Network Traffic Analysis): Analyze web server logs (e.g., IIS logs) on WSUS servers. Look for anomalous requests, large POST bodies, or requests from untrusted internal or external IP addresses, which could indicate exploitation attempts against CVE-2025-59287.

Mitigation

  • Patch Immediately (D3-SU: Software Update): The primary mitigation is to apply the October 2025 security updates across all affected Windows systems. Prioritize patching based on risk: 1) WSUS Servers, 2) Internet-facing systems, 3) Domain Controllers and other critical servers, 4) Workstations.
  • WSUS Hardening: Restrict network access to WSUS servers. There should be no reason for these servers to be accessible from the internet. Limit access to only necessary client subnets and upstream update servers.
  • Migrate from Windows 10: Develop and execute a plan to migrate all remaining Windows 10 endpoints to Windows 11 to ensure continued security patching.
  • Privileged Access Management: Implement least privilege principles to limit the impact of privilege escalation vulnerabilities like CVE-2025-59230. Standard users should not have local administrative rights.

Timeline of Events

1
October 17, 2025
This article was published

Article Updates

October 19, 2025

New technical details on CVE-2025-59287 WSUS RCE, detailing unsafe deserialization via crafted cookie.

MITRE ATT&CK Mitigations

The primary mitigation is to apply the October 2025 security updates to all affected Microsoft products.

Mapped D3FEND Techniques:

Restrict network access to the WSUS server's management interface from all but essential systems to limit the attack surface for CVE-2025-59287.

Mapped D3FEND Techniques:

Enforce the principle of least privilege to minimize the impact of a successful privilege escalation attack like CVE-2025-59230.

Mapped D3FEND Techniques:

Microsoft's mitigation for CVE-2025-24990 was to remove the vulnerable Agere modem driver entirely, a definitive form of mitigation.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Immediately prioritize the deployment of Microsoft's October 2025 security updates to all vulnerable systems. A risk-based rollout is essential. Phase 1 should target the most critical assets: Windows Server Update Service (WSUS) servers must be patched first to prevent exploitation of the 9.8 CVSS RCE flaw (CVE-2025-59287), which could enable an internal supply chain attack. Concurrently, patch all internet-facing systems (e.g., web servers, VPN gateways) and domain controllers. Phase 2 should cover all other servers and critical workstations. Phase 3 should complete the rollout to the general user population. Utilize automated patch management systems to ensure comprehensive coverage and verify successful installation through post-deployment compliance scanning. For the Windows 10 end-of-life, this update serves as the final trigger to accelerate migration projects to supported operating systems like Windows 11.

As a critical compensating control for CVE-2025-59287, implement strict network isolation for all WSUS servers. These servers should not be accessible from the public internet. Use firewall rules to restrict inbound access to the WSUS ports (e.g., 8530/8531) to only allow connections from client subnets within the managed environment and trusted upstream Microsoft update sources or internal upstream WSUS servers. Egress traffic should also be filtered to prevent a compromised WSUS server from communicating with attacker command-and-control infrastructure. This network segmentation significantly reduces the attack surface and contains the potential blast radius of a compromise, even before the patch is applied.

To detect potential exploitation of the RasMan privilege escalation flaw (CVE-2025-59230), configure Endpoint Detection and Response (EDR) tools to monitor for anomalous process creation chains. Specifically, create detection rules that alert on the svchost.exe -k netsvcs process (parent to RasMan) spawning unexpected child processes like cmd.exe, powershell.exe, or any unsigned binaries. Establish a baseline of normal behavior for this service host process. Any deviation, such as a process running with SYSTEM integrity that was initiated by a non-administrative user context associated with RasMan, should be treated as a high-confidence indicator of compromise and trigger an immediate incident response investigation. This analysis is crucial for detecting post-exploitation activity after an attacker has gained an initial foothold.

Sources & References(when first published)

Microsoft patches three zero-days actively exploited by attackers
Help Net Security (helpnetsecurity.com) October 15, 2025
Patch Tuesday, October 2025 'End of 10' Edition
Krebs on Security (krebsonsecurity.com) October 14, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Patch TuesdayZero-DayRCEEoPWindows 10Windows 11WSUSCISAKEV

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading