Microsoft October 2025 Patch Tuesday: six zero-days and 172 fixes

Microsoft’s October 2025 Patch Tuesday delivers fixes for 172 security issues, including six zero-days. Three were actively exploited before patches; three were publicly exposed. Windows 10 also reaches the final day of free security support. Key numbers, components, and source links appear below.

What happened on October 14, 2025

Microsoft released cumulative updates addressing 172 vulnerabilities. The company identified six zero-day issues: three exploited in attacks and three publicly disclosed. The set includes eight Critical-severity flaws: five permit remote code execution, and three enable elevation of privilege, as reported by BleepingComputer>. Advisory entries in Microsoft’s guide list affected products, CVEs, and severity.

Vulnerability categories in this release

  • Elevation of Privilege: 80
  • Security Feature Bypass: 11
  • Remote Code Execution: 31
  • Information Disclosure: 28
  • Denial of Service: 11
  • Spoofing: 10

Context: Windows 10 support milestone

Windows 10 reaches the end of free security updates with this cycle. Microsoft offers Extended Security Updates (ESU) for an additional period. Details appear in Microsoft’s security update documentation and release notes.

Which zero-days were fixed

The table lists the six zero-day entries referenced in reporting and advisories. Links point to Microsoft’s Security Update Guide or the original disclosures. Descriptions below mirror vendor language and public write-ups.

CVE Component Type Status noted
CVE-2025-24990> Agere Modem driver (ltmdm64.sys) Elevation of Privilege Exploited in the wild
CVE-2025-59230> Remote Access Connection Manager (RasMan) Elevation of Privilege Exploited in the wild
CVE-2025-47827> IGEL OS Secure Boot Secure Boot bypass Exploited in the wild
CVE-2025-0033> AMD SEV-SNP (RMP initialization) Integrity impact Publicly disclosed
CVE-2025-24052> Agere Modem driver Elevation of Privilege Publicly disclosed
CVE-2025-2884> TCG TPM 2.0 reference implementation Out-of-Bounds read Publicly disclosed

Notes from advisories and disclosures

  • Microsoft removed the Agere ltmdm64.sys driver from supported Windows builds. The company notes that fax-modem hardware may stop functioning after removal. See the advisory linked under CVE-2025-24990>.
  • RasMan exploitation required local access and preparatory steps to escalate to SYSTEM, per Microsoft’s description for CVE-2025-59230>.
  • The IGEL OS Secure Boot issue allowed a crafted SquashFS image to bypass signature checks. The public write-up is available on GitHub: CVE-2025-47827>.
  • AMD’s SEV-SNP item concerns a race condition in Reverse Map Table initialization. AMD’s bulletin is here: AMD SB-3020>.
  • The Trusted Computing Group published a PDF advisory for the TPM 2.0 issue referenced as CVE-2025-2884> and detailed at TCG advisory>.

How Microsoft framed overall risk without speculation

The counts distribute across privilege escalation, code execution, information leak, spoofing, and service disruption. The zero-day entries carry explicit exploitation or disclosure status. Several fixes integrate partner-assigned CVEs, including those from IGEL and TCG. For recent context on enterprise infrastructure risk during patch windows, see our earlier coverage of the F5 Networks breach>.

Additional vendor activity this month

Other companies issued updates during October 2025. These items help readers understand broader patch loads overlapping with Microsoft’s cycle.

References