Overview
- Microsoft’s update addresses vulnerabilities across Windows, Office, Edge components, Visual Studio and more, with one Windows Kernel zero-day (CVE-2025-62215) confirmed as exploited.
- CVE-2025-62215 enables local elevation to SYSTEM by winning a race condition in the kernel, and researchers report a functional exploit in the wild used for post‑exploitation privilege escalation.
- The most severe bug, GDI+ RCE CVE-2025-60724 (CVSS 9.8), can be triggered by a specially crafted metafile and, in some cases, by uploading such a file to a vulnerable web service.
- Other high‑impact fixes include an Office RCE (CVE-2025-62199), a DirectX Graphics Kernel EoP (CVE-2025-60716) and a Visual Studio RCE (CVE-2025-62214), while Microsoft marked several “important” flaws such as WinSock AFD EoPs and CEIP/CSC issues as more likely to be exploited.
- Following Windows 10’s end of life, Microsoft released KB5071959 to fix failures enrolling devices into Extended Security Updates, a key step for organizations maintaining legacy systems.