Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Last Windows 10 Patch Tuesday Fixes Six Zero Days
News

Last Windows 10 Patch Tuesday Fixes Six Zero Days

Team-CWDBy Team-CWDOctober 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


It’s set to be a busy October for system administrators after Microsoft issued security updates to fix 172 vulnerabilities including six classed as zero-days.

Three of the zero-day vulnerabilities in this month’s Patch Tuesday list are being actively exploited.

CVE-2025-59230 is a local elevation of privilege (EoP) bug in the Windows Remote Access Connection Manager.

“With no user interaction required, this will go straight into an attacker’s standard toolkit,” warned Rapid7 lead software engineer, Adam Barnett.

“There’s very little information in the advisory itself, but someone out there knows exactly how to exploit this vulnerability.”

CVE-2025-24990 is another EoP vulnerability, this time in the third-party Agere Modem driver (ltmdm64.sys) which ships with Windows. Interestingly, Microsoft has removed the driver rather than patch the flaw.

Ben McCarthy, lead cybersecurity engineer at Immersive, argued that the bug highlights the risks of legacy components.

“This driver, which supports hardware from the late 1990s and early 2000s, predates current secure development practices and has remained largely unchanged for years. Kernel-mode drivers operate with the highest system privileges, making them a primary target for attackers seeking to escalate their access,” he explained. 

“Microsoft’s decision to remove the driver entirely, rather than issue a patch, is a direct response to the risks associated with modifying unsupported, third-party legacy code. Attempts to patch such a component can be unreliable, potentially introducing system instability or failing to address the root cause of the vulnerability completely.”

Read more on Patch Tuesday: Two Zero-Days Among Patch Tuesday CVEs This Month

The third zero-day actively being exploited in the wild is CVE-2025-47827: a secure boot bypass bug that affects IGEL OS, a third-party OS designed to provide virtual desktop infrastructure.

Kev Breen, senior director of threat research at Immersive, claimed a proof of concept has been available for this vulnerability since May, making exploitation trivial.

“The impacts of a secure boot bypass can be significant, as threat actors can deploy a kernel-level rootkit, gaining access to the IGEL OS itself and, by extension then tamper with the virtual desktops, including capturing credentials,” he added.

“It should be noted that this is not a remote attack, and physical access is typically required to exploit this type of vulnerability, meaning that ‘evil-maid’ style attacks are the most likely vector affecting employees who travel frequently.”

Three Publicly Disclosed Zero-Days

The three remaining zero-days have been publicly disclosed but so far not exploited. They are:

  • CVE-2025-0033: a critical vulnerability in AMD EPYC processors using Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP), for which there’s not yet a patch
  • CVE-2025-24052: an EoP bug in Agere Modem driver similar to CVE-2025-24990
  • CVE-2025-2884: an out-of-bounds read vulnerability in TCG TPM2.0 that could result in information disclosure or denial of service 

This is the last Patch Tuesday in which Windows 10 users will receive free updates. To continue receiving patches, consumers and business customers will need to pay for Microsoft’s Extended Security Updates (ESU) scheme.

Image credit: gguy / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware
Next Article CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Don’t let “back to school” become “back to bullying”

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.