Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days
11 mins read

Microsoft September 2025 Patch Tuesday fixes 81 flaws, two zero-days

Today is Microsoft’s September 2025 Patch Tuesday, which includes security updates for 81 flaws, including two publicly disclosed zero-day vulnerabilities.

This Patch Tuesday also fixes nine “Critical” vulnerabilities, five of which are remote code execution vulnerabilities, 1 is information disclosure, and 2 are elevation of privileges.

The number of bugs in each vulnerability category is listed below:

  • 41 Elevation of Privilege Vulnerabilities
  • 2 Security Feature Bypass Vulnerabilities
  • 22 Remote Code Execution Vulnerabilities
  • 16 Information Disclosure Vulnerabilities
  • 3 Denial of Service Vulnerabilities
  • 1 Spoofing Vulnerabilities

When GeekFeed reports on the Patch Tuesday security updates, we only count those released on Patch Tuesday.

Therefore, the number of flaws does not include three Azure, one Dynamics 365 FastTrack Implementation Assets, two Mariner, five Microsoft Edge, and 1 Xbox vulnerabilities fixed earlier this month.

To learn more about the non-security updates released today, you can review our dedicated articles on the Windows 11 KB5065426 & KB5065431 cumulative updates and the Windows 10 KB5065429 update.

Two publicly disclosed zero-days fixed

This month’s Patch Tuesday fixes two publicly disclosed zero-day flaws in Windows SMB Server and Microsoft SQL Server. Microsoft classifies a zero-day flaw as publicly disclosed or actively exploited while no official fix is available.

The two publicly disclosed zero-days are:

CVE-2025-55234 – Windows SMB Elevation of Privilege Vulnerability

Microsoft fixed an elevation of privileges flaw in SMB Server that is exploited through relay attacks.

“SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks,” explains Microsoft.

Microsoft says that Windows already includes settings to harden the SMB Server against relay attacks, including enabling SMB Server Signing and SMB Server Extended Protection for Authentication (EPA).

However, enabling these features could cause compatibility issues with older devices and implementations.

Microsoft recommends that admins enable auditing on SMB servers to determine if they will encounter any issues when those hardening features are fully enforced.

“As part of the Windows updates released on and after September 9, 2025 (CVE-2025-55234), support is enabled for auditing SMB client compatibility for SMB Server signing as well as SMB Server EPA,” explains Microsoft.

Microsoft has not attributed the flaw to any researchers, and it is unclear where it was disclosed.

CVE-2024-21907 – VulnCheck: CVE-2024-21907 Improper Handling of Exceptional Conditions in Newtonsoft.Json

Microsoft has fixed a previously known vulnerability in Newtonsoft.Json that is included as part of Microsoft SQL Server.

“CVE-2024-21907 addresses a mishandling of exceptional conditions vulnerability in Newtonsoft.Json before version 13.0.1,” explains Microsoft.

“Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.”

“The documented SQL Server updates incorporate updates in Newtonsoft.Json which address this vulnerability.”

This flaw was publicly disclosed in 2024.

Recent updates from other companies

Other vendors who released updates or advisories in September 2025 include:

The September 2025 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the September 2025 Patch Tuesday updates.

TagCVE IDCVE TitleSeverity
Azure – NetworkingCVE-2025-54914Azure Networking Elevation of Privilege VulnerabilityCritical
Azure ArcCVE-2025-55316Azure Arc Elevation of Privilege VulnerabilityImportant
Azure Bot ServiceCVE-2025-55244Azure Bot Service Elevation of Privilege VulnerabilityCritical
Azure EntraCVE-2025-55241Azure Entra Elevation of Privilege VulnerabilityCritical
Azure Windows Virtual Machine AgentCVE-2025-49692Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
Capability Access Management Service (camsvc)CVE-2025-54108Capability Access Management Service (camsvc) Elevation of Privilege VulnerabilityImportant
Dynamics 365 FastTrack Implementation AssetsCVE-2025-55238Dynamics 365 FastTrack Implementation Assets Information Disclosure VulnerabilityCritical
Graphics KernelCVE-2025-55236Graphics Kernel Remote Code Execution VulnerabilityCritical
Graphics KernelCVE-2025-55223DirectX Graphics Kernel Elevation of Privilege VulnerabilityImportant
Graphics KernelCVE-2025-55226Graphics Kernel Remote Code Execution VulnerabilityCritical
Microsoft AutoUpdate (MAU)CVE-2025-55317Microsoft AutoUpdate (MAU) Elevation of Privilege VulnerabilityImportant
Microsoft Brokering File SystemCVE-2025-54105Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2025-9866Chromium: CVE-2025-9866 Inappropriate implementation in ExtensionsUnknown
Microsoft Edge (Chromium-based)CVE-2025-9867Chromium: CVE-2025-9867 Inappropriate implementation in DownloadsUnknown
Microsoft Edge (Chromium-based)CVE-2025-53791Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilityModerate
Microsoft Edge (Chromium-based)CVE-2025-9864Chromium: CVE-2025-9864 Use after free in V8Unknown
Microsoft Edge (Chromium-based)CVE-2025-9865Chromium: CVE-2025-9865 Inappropriate implementation in ToolbarUnknown
Microsoft Graphics ComponentCVE-2025-53807Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-53800Windows Graphics Component Elevation of Privilege VulnerabilityCritical
Microsoft High Performance Compute Pack (HPC)CVE-2025-55232Microsoft High Performance Compute (HPC) Pack Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2025-54910Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-55243Microsoft OfficePlus Spoofing VulnerabilityImportant
Microsoft OfficeCVE-2025-54906Microsoft Office Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-54902Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-54899Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-54904Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-54903Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-54898Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-54896Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-54900Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-54901Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office PowerPointCVE-2025-54908Microsoft PowerPoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-54897Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office VisioCVE-2025-54907Microsoft Office Visio Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-54905Microsoft Word Information Disclosure VulnerabilityImportant
Microsoft Virtual Hard DriveCVE-2025-54112Microsoft Virtual Hard Disk Elevation of Privilege VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-54092Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-54091Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-54115Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Role: Windows Hyper-VCVE-2025-54098Windows Hyper-V Elevation of Privilege VulnerabilityImportant
SQL ServerCVE-2025-47997Microsoft SQL Server Information Disclosure VulnerabilityImportant
SQL ServerCVE-2025-55227Microsoft SQL Server Elevation of Privilege VulnerabilityImportant
SQL ServerCVE-2024-21907VulnCheck: CVE-2024-21907 Improper Handling of Exceptional Conditions in Newtonsoft.JsonUnknown
Windows Ancillary Function Driver for WinSockCVE-2025-54099Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows BitLockerCVE-2025-54911Windows BitLocker Elevation of Privilege VulnerabilityImportant
Windows BitLockerCVE-2025-54912Windows BitLocker Elevation of Privilege VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-53802Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2025-54102Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2025-54114Windows Connected Devices Platform Service (Cdpsvc) Denial of Service VulnerabilityImportant
Windows Defender Firewall ServiceCVE-2025-53810Windows Defender Firewall Service Elevation of Privilege VulnerabilityImportant
Windows Defender Firewall ServiceCVE-2025-53808Windows Defender Firewall Service Elevation of Privilege VulnerabilityImportant
Windows Defender Firewall ServiceCVE-2025-54094Windows Defender Firewall Service Elevation of Privilege VulnerabilityImportant
Windows Defender Firewall ServiceCVE-2025-54915Windows Defender Firewall Service Elevation of Privilege VulnerabilityImportant
Windows Defender Firewall ServiceCVE-2025-54109Windows Defender Firewall Service Elevation of Privilege VulnerabilityImportant
Windows Defender Firewall ServiceCVE-2025-54104Windows Defender Firewall Service Elevation of Privilege VulnerabilityImportant
Windows DWMCVE-2025-53801Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows Imaging ComponentCVE-2025-53799Windows Imaging Component Information Disclosure VulnerabilityCritical
Windows Internet Information ServicesCVE-2025-53805HTTP.sys Denial of Service VulnerabilityImportant
Windows KernelCVE-2025-53803Windows Kernel Memory Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-53804Windows Kernel-Mode Driver Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-54110Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows Local Security Authority Subsystem Service (LSASS)CVE-2025-54894Local Security Authority Subsystem Service Elevation of Privilege VulnerabilityImportant
Windows Local Security Authority Subsystem Service (LSASS)CVE-2025-53809Local Security Authority Subsystem Service (LSASS) Denial of Service VulnerabilityImportant
Windows Management ServicesCVE-2025-54103Windows Management Service Elevation of Privilege VulnerabilityImportant
Windows MapUrlToZoneCVE-2025-54107MapUrlToZone Security Feature Bypass VulnerabilityImportant
Windows MapUrlToZoneCVE-2025-54917MapUrlToZone Security Feature Bypass VulnerabilityImportant
Windows MultiPoint ServicesCVE-2025-54116Windows MultiPoint Services Elevation of Privilege VulnerabilityImportant
Windows NTFSCVE-2025-54916Windows NTFS Remote Code Execution VulnerabilityImportant
Windows NTLMCVE-2025-54918Windows NTLM Elevation of Privilege VulnerabilityCritical
Windows PowerShellCVE-2025-49734PowerShell Direct Elevation of Privilege VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-54095Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-54096Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53797Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53796Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-54106Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-54097Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53798Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-54113Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-55225Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-53806Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows SMBCVE-2025-55234Windows SMB Elevation of Privilege VulnerabilityImportant
Windows SMBv3 ClientCVE-2025-54101Windows SMB Client Remote Code Execution VulnerabilityImportant
Windows SPNEGO Extended NegotiationCVE-2025-54895SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Elevation of Privilege VulnerabilityImportant
Windows TCP/IPCVE-2025-54093Windows TCP/IP Driver Elevation of Privilege VulnerabilityImportant
Windows UI XAML Maps MapControlSettingsCVE-2025-54913Windows UI XAML Maps MapControlSettings Elevation of Privilege VulnerabilityImportant
Windows UI XAML Phone DatePickerFlyoutCVE-2025-54111Windows UI XAML Phone DatePickerFlyout Elevation of Privilege VulnerabilityImportant
Windows Win32K – GRFXCVE-2025-55224Windows Hyper-V Remote Code Execution VulnerabilityCritical
Windows Win32K – GRFXCVE-2025-55228Windows Graphics Component Remote Code Execution VulnerabilityCritical
Windows Win32K – GRFXCVE-2025-54919Windows Graphics Component Remote Code Execution VulnerabilityImportant
XboxCVE-2025-55242Xbox Certification Bug Copilot Djando Information Disclosure VulnerabilityCritical
XBox Gaming ServicesCVE-2025-55245Xbox Gaming Services Elevation of Privilege VulnerabilityImportant

Leave a Reply

Your email address will not be published. Required fields are marked *