Microsoft Patch Tuesday 2025: Year in Review — 1,130 CVEs, 41 Zero-Days, EoP Surges (2026)

Microsoft's Patch Tuesday 2025: A Year in Review

Microsoft's Patch Tuesday, a monthly software patch release, has been a cornerstone of cybersecurity for over two decades. In 2025, it addressed a staggering 1,130 CVEs, a 12% increase from 2024. This marks the second consecutive year with over 1,000 CVEs addressed, and the third time since Patch Tuesday's inception. Here's a breakdown of the key findings and insights from this year's Patch Tuesday releases.

Elevated Vulnerability Counts

  • Zero-Day Vulnerabilities: Microsoft patched 41 zero-day vulnerabilities in 2025, with 24 exploited in the wild. This highlights the ongoing challenge of staying ahead of threat actors who exploit these vulnerabilities before patches are available.
  • Exploitation Activity: EoP vulnerabilities (Elevation of Privilege) dominated, accounting for 38.3% of all vulnerabilities. RCE (Remote Code Execution) followed at 30.8%, while information disclosure flaws made up 14.2%.

Severity and Impact Analysis

Microsoft categorizes vulnerabilities into four severity levels: Low, Moderate, Important, and Critical. In 2025, 91.3% of CVEs were rated Important, followed by Critical at 8.1%. Moderate vulnerabilities were rare, accounting for only 0.4%.

The impact categories further break down vulnerabilities into specific threats: RCE, EoP, DoS, information disclosure, spoofing, security feature bypass, and tampering. EoP vulnerabilities, often exploited by advanced persistent threats (APTs), dominated with 38.3%. RCE vulnerabilities, while less prevalent, still posed a significant risk at 30.8%.

Notable Zero-Day Exploits

Several zero-day vulnerabilities were exploited in 2025, showcasing the real-world impact of these vulnerabilities:

  • CVE-2025-24983: Exploited by the PipeMagic backdoor to spread ransomware, this EoP vulnerability targeted the Windows Win32 Kernel Subsystem.
  • CVE-2025-29824: Abused by the PipeMagic backdoor to deploy RansomEXX ransomware, this EoP vulnerability affected the Windows Common Log File System Driver.
  • CVE-2025-26633: Exploited by the MSC EvilTwin trojan loader and associated malware, this security feature bypass vulnerability targeted Microsoft Management Console.
  • CVE-2025-33053: Used by the Stealth Falcon APT to deploy Horus Agent malware, this RCE vulnerability targeted Internet Shortcut Files.
  • CVE-2025-49704 and CVE-2025-49706: Chained together in the ToolShell attack, these vulnerabilities were exploited by multiple APTs and nation-state actors to deploy malware and ransomware.

Looking Ahead

The upward trend in vulnerability counts highlights the ongoing challenge of cybersecurity. As Microsoft continues to address vulnerabilities, defenders must stay vigilant and promptly apply patches to mitigate risks. Attackers are constantly evolving, seeking new ways to exploit vulnerabilities. The Tenable Research Special Operations (RSO) team will continue to provide in-depth analysis and actionable insights through their monthly Patch Tuesday blogs, empowering organizations to strengthen their security posture.

Microsoft Patch Tuesday 2025: Year in Review — 1,130 CVEs, 41 Zero-Days, EoP Surges (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Edwin Metz

Last Updated:

Views: 6001

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Edwin Metz

Birthday: 1997-04-16

Address: 51593 Leanne Light, Kuphalmouth, DE 50012-5183

Phone: +639107620957

Job: Corporate Banking Technician

Hobby: Reading, scrapbook, role-playing games, Fishing, Fishing, Scuba diving, Beekeeping

Introduction: My name is Edwin Metz, I am a fair, energetic, helpful, brave, outstanding, nice, helpful person who loves writing and wants to share my knowledge and understanding with you.