<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/chris-goettl/rss" /><link>https://www.ivanti.com/blog/authors/chris-goettl</link><item><guid isPermaLink="false">f8cfc685-7ce1-4b20-ad54-5de5267a9cc0</guid><link>https://www.ivanti.com/blog/patch-apocalypse</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Security</category><category>Artificial Intelligence</category><title>We’re in a Patch Apocalypse. That Means These Three IT Excuses Won’t Work Anymore.</title><description>&lt;p&gt;On April 7, Anthropic announced that its Claude Mythos Preview model had autonomously identified thousands of high- and critical-severity zero-day vulnerabilities across every major operating system and every major web browser. Over 99% of them were unpatched the day of disclosure.&lt;/p&gt;

&lt;p&gt;Two weeks later, on April 21, Mozilla said it had used the same model to find and patch 271 vulnerabilities in the latest Firefox release. Mozilla's own assessment: "So far we've found no category or complexity of vulnerability that humans can find that this model can't."&lt;/p&gt;

&lt;p&gt;271 is the first wave. Chrome, Edge, Windows, macOS, Linux, FreeBSD — the 17-year-old remote code execution flaw in FreeBSD that Anthropic's red team disclosed (CVE-2026-4747) is an early example of what's coming. Every vendor under Anthropic's Project Glasswing umbrella is positioned to ship fixes at a tempo the industry hasn't seen before. All those fixes become public CVEs with patches available, which lands them in the same place: your environment.&lt;/p&gt;

&lt;p&gt;The containment story also has a crack. On April 21, &lt;a href="https://www.bloomberg.com/news/articles/2026-04-21/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users" rel="noopener" target="_blank"&gt;Bloomberg reported&lt;/a&gt; that a Discord-linked group gained unauthorized access to Mythos through a third-party vendor environment. Anthropic says the activity didn't extend beyond that vendor. Whether or not similar capability is already in attacker hands, the defensive runway is shorter than the April 7 announcement implied.&lt;/p&gt;

&lt;p&gt;Mythos entered a world already trending this way. &lt;a href="https://www.crowdstrike.com/en-us/global-threat-report/" rel="noopener" target="_blank"&gt;CrowdStrike's 2026 Global Threat Report&lt;/a&gt; documented an 89% year-over-year rise in AI-enabled attacks in 2025. That trend line predates Mythos.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Call this a patch apocalypse&lt;/strong&gt;. The plain operational kind, where the volume and cadence of public CVEs with available patches is about to outrun how most IT and security teams currently work.&lt;/p&gt;

&lt;p&gt;NIST is already feeling the effects of the patch apocalypse. In April, the agency announced a major shift in the National Vulnerability Database (NVD) operations in response to a 263% surge in submissions. NIST will no longer provide detailed enrichment to all vulnerabilities submitted, and will instead only provide this for vulnerabilities that meet a high-risk criteria, such as those in the CISA Known Exploited Vulnerabilities catalog or those affecting critical government software. NIST will be relying on CVE Number Authorities (CNAs), like Ivanti, rather than performing its own independent assessment.&lt;/p&gt;

&lt;p&gt;I've been hearing three versions of the same response from customers and peers since the announcement. All three are variations of a program designed for a slower world.&lt;/p&gt;

&lt;h2 id="toc_1"&gt;“We have a vulnerability scanner”&lt;/h2&gt;

&lt;p&gt;Qualys, Rapid7 and Tenable do vulnerability discovery well. Scanners find, flag, score and list. Deployment, verification, reboot handling and rollback are outside their scope. That work still has to happen somewhere. In most programs it happens in a separate tool, with a separate team, on a separate cadence.&lt;/p&gt;

&lt;p&gt;With the exploit window now running in hours and the Glasswing queue about to double the backlog, a scanner that produces 587 critical vulnerabilities and hands the list to a human team is a liability. The practical move is to connect the scanner you already own to a remediation engine that can act on its findings automatically. An &lt;a href="https://www.ivanti.com/autonomous-endpoint-management"&gt;autonomous endpoint management&lt;/a&gt; (AEM) platform, with ring-based deployment and rollback, and vulnerability intelligence to provide risk-based context for efficient remediation decisions so the list shrinks without a humans making every decision.&lt;/p&gt;

&lt;h2 id="toc_2"&gt;“We drive approvals through our ticketing system”&lt;/h2&gt;

&lt;p&gt;Speaking of humans having to make decisions… Long linear approval processes are going to slow the remediation process significantly. When is the last time you had to decide whether you were going to deploy the latest OS or browser update?&lt;/p&gt;

&lt;p&gt;Organizations already know they are going to deploy these updates. Often the approval process is due to complex internal politics and misalignment on security outcomes. The end result? A very linear process that requires the vulnerability scanner previously mentioned, an analyst approving what you already know needs to be done, tickets going out to business owners for approval and sitting in inboxes waiting for approval, and ultimately valuable time wasted on a decision that was essentially already well understood and did not need to be made.&lt;/p&gt;

&lt;p&gt;The market shift to &lt;a href="https://www.ivanti.com/exposure-management"&gt;Exposure Management&lt;/a&gt; is approaching this process very differently by focusing on defining an organizations risk-appetite and monitoring risk-posture. Next time a Windows OS update releases you already know you will deploy it, the schedule you will deploy it on and your SLA and compliance metrics you will measure success by. What you really want to know is:&lt;/p&gt;

&lt;p&gt;1. Do I need to move faster because the update includes known exploited vulnerabilities?&lt;/p&gt;

&lt;p&gt;Or&lt;/p&gt;

&lt;p&gt;2. Is the update impacting operations and we need to slow down (good thing the Autonomous Endpoint Management platform includes ring deployment with rollback)?&lt;/p&gt;

&lt;h2 id="toc_3"&gt;“We have Intune”&lt;/h2&gt;

&lt;p&gt;Microsoft Intune has two scope limits that matter here.&lt;/p&gt;

&lt;p&gt;First, it only manages devices enrolled with it. Unenrolled and unmanaged endpoints — servers, contractor laptops, shadow IT, neglected edge devices — sit outside its visibility entirely. During periods of increased vulnerability volume, those blind spots multiply faster than teams can handle manually.&lt;/p&gt;

&lt;p&gt;Second, while Intune simplifies application deployment and updates, its third-party application coverage and prioritization depth are narrower than most administrators realize. Intune can tell you &lt;em&gt;what’s out of date&lt;/em&gt;, but not &lt;em&gt;what actually increases your exposure&lt;/em&gt;––which forces teams to patch everything reactively, or based on guesswork when time is scarce.&lt;/p&gt;

&lt;p&gt;Most enterprise environments aren’t exclusively Windows, fully enrolled, or running a small, homogenous app stack. When vulnerability disclosures spike, routing patching leaves gaps and turns into systemic risk.&lt;/p&gt;

&lt;p&gt;Keep Intune. Pair it with a discovery and remediation layer that finds the assets Intune can't see, prioritizes the vulnerabilities that matter most, and applies patches with confidence across the applications Intune doesn’t cover.&lt;/p&gt;

&lt;h2 id="toc_4"&gt;What to do about it&lt;/h2&gt;

&lt;p&gt;Automation is the operating model. It has to be built into the workflow.&lt;/p&gt;

&lt;p&gt;Practitioners have known the principle for a while. It shows up in three places:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Continuous triage.&lt;/strong&gt; Known exploited vulnerabilities can follow a zero-day response track especially in less secure parts of the organization like end user systems. Above that, set and define specific applications like the browsers and telecommunication apps to get updated on a priority track that is checked weekly or even daily. Everything else can wait for the regularly maintenance window to come around.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Ring deployment with automated rollback.&lt;/strong&gt; Test ring, early-adopter ring, broad production, mission-critical. The sequence is boring and it works for most maintenance. What's changed is that certain updates will need to compress to fit the exploit window vs waiting for your monthly maintenance. The test ring has to be automated and instrumented — a human checklist can't move that fast.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Closed-loop verification.&lt;/strong&gt; The patch isn't deployed until it's verified installed on the endpoint, and the CVE isn't closed until a rescan confirms it. Most teams skip that step, which is why compliance evidence becomes a fire drill the week before the audit. That's why we shipped continuous compliance in our platform this week — so compliance evidence is produced continuously and automatically as patches deploy, with automation handling the prioritization decisions most teams don't have bandwidth for.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Mozilla's 271 Firefox vulnerabilities are a preview. Every major software vendor under Glasswing is about to startfixing more vulnerabilities and at an accelerated pace, and attackers with the same class of capability will be looking for exactly those openings whenever they gain access to a model like it. The resulting AI arms race will have a direct affect on the number and frequency of updates that organizations will have to remediate and at an accelerated pace. Automation is what carries a program through. Teams still doing monthly-only patching are in for a rough stretch.&lt;/p&gt;

&lt;p&gt;If you run an IT or security program, the self-assessment is worth doing now. Take the last critical patch you pushed out. Even better, if a zero-day came out on a Friday would you be able to remediate it by Monday? Time it from CVE publication to verified install on the last endpoint. If that number is measured in weeks, the patch apocalypse is going to find you.&lt;/p&gt;
</description><pubDate>Wed, 29 Apr 2026 14:00:07 Z</pubDate></item><item><guid isPermaLink="false">1c8ff1fb-4b1f-4f6d-93a5-1e1eb9619ac2</guid><link>https://www.ivanti.com/blog/april-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>April 2026 Patch Tuesday</title><description>&lt;p&gt;The lead up to Patch Tuesday has been interesting. We had a Google Chrome zero-day (CVE-2026-5281) that was patched on April 1, an Adobe Acrobat Reader zero-day (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) late in the day on Friday April 10, and several older CVEs that were added to the CISA KEV list yesterday (&lt;a href="https://www.cisa.gov/news-events/alerts/2026/04/13/cisa-adds-seven-known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;April 13&lt;/a&gt;). All of this amidst a lot of industry buzz about Anthropic Mythos and &lt;a href="https://www.anthropic.com/glasswing" rel="noopener" target="_blank"&gt;Project Glasswing&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;What is the correlation between these events and Project Glasswing you ask? Most of the discussions around Mythos have been focused on where it will be used and the ramifications.&lt;/p&gt;

&lt;p&gt;Finding exploitable flaws in code can be a powerful tool for good when used by the vendor writing the code before it is released. However, it will also be used by researchers and threat actors to find flaws in code that is already released and that is where my speculation is directed.&lt;/p&gt;

&lt;p&gt;Consider the knock-on effects of a massive model like Mythos and what it will mean near term and longer term for the software that companies consume. Near term you will have the big players using a solution like this to release more secure code. As researchers and threat actors adopt more robust AI models to identify exploitable flaws this will result in more coordinated disclosures (good), zero-day exploits (bad) and n-day exploits (bad). All of this will result in more frequent, and more importantly, urgent software updates.&lt;/p&gt;

&lt;p&gt;Many organizations currently struggle to keep up with priority updates resolving exploited vulnerabilities when they occur outside of their normal monthly maintenance. I suspect most organizations were not aware of the Adobe Acrobat zero-day exploit until the CISA KEV update yesterday. This means that threat actors had another 2-3 days of free reign to exploit CVE-2026-34621 before most organizations became aware and many of those organizations will likely handle the update as part of their regular maintenance that is starting today on Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Browser security updates are a weekly occurrence. Many other applications that users are utilizing regularly release updates on a continuous cadence, not a set monthly release date. This means many of the user targeted exploits are going to occur in software that is releasing outside of the average organizations maintenance schedules and that frequency is about to increase. It is hard to say if that increase is going to be 1.5x or 5x, but rest assured that the increase will be noticeable and will exacerbate a challenge that most organizations already struggle with – timely patch management.&lt;/p&gt;

&lt;p&gt;Enter Exposure Management. This is really a mindset and maturity change as much as a technology evolution. The mindset change requires us to consider a world where we need to make the decisions up front and monitor those decisions. This is called defining your Risk Appetite and monitoring your Risk Posture. Doing this effectively matures an organizations’ response to risks and makes remediation activities much more clear cut.&lt;/p&gt;

&lt;p&gt;The technology evolution requires the traditional vulnerability assessment technologies to integrate into a broader ecosystem where asset visibility or system of record comes together with vulnerability assessment and vulnerability intelligence solutions to refine when risks require more immediate action vs waiting for your regular maintenance activities to occur. Most important is the need for this tech stack to be integrated with your AEM (Autonomous Endpoint Management) platform as this is where remediation predominantly (and automatically) occurs.&lt;/p&gt;

&lt;p&gt;Now, back to our regularly scheduled Patch Tuesday update. Microsoft has resolved 169 CVEs this month which is a massive patch Tuesday lineup. April Patch Tuesday is the second-largest Patch Tuesday on record behind the October 2025 Patch Tuesday which resolved 175 CVEs. The lineup includes one zero-day exploit (CVE-2026-3220) and one public disclosure (CVE-2026-33825) and breaks down into 8 Critical, 156 Important, 3 Moderate and 1 Low severity.&lt;/p&gt;

&lt;p&gt;The zero-day CVE is in Microsoft SharePoint and the public disclosure is in Microsoft Defender making those two updates the most urgent for this month in addition to the Adobe Acrobat and Google Chrome updates leading up to Patch Tuesday.&lt;/p&gt;

&lt;h2&gt;Microsoft’s known exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Server Spoofing Vulnerability in Microsoft SharePoint (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 6.5, but it has been confirmed to be exploited in the wild. An attacker who successfully exploits this vulnerability can view sensitive information and make changes to the disclosed information. The vulnerability affects SharePoint server Subscription Edition, SharePoint Server 2019 and SharePoint Server 2016. A risk-based prioritization methodology warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege Vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825" rel="noopener" target="_blank"&gt;CVE-2026-33825&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but has been publicly disclosed. The CVE lists exploit code maturity as Proof-of-Concept which puts this at a higher risk of exploitation. An attacker could use this vulnerability to allow an authorized attacker to elevate their privileges to SYSTEM on the local machine.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for April. The update affects Ivanti Neurons for ITSM and resolves two CVEs. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/april-2026-security-update"&gt;April Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released twelve updates this month, eleven of which released on Patch Tuesday and the zero-day update for Acrobat that released on Friday, April 10. 54 CVEs were resolved with a breakdown of 39 Critical, 13 Important and 2 Moderate. APSB26-43 resolved the zero-day exploit (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;).&lt;/p&gt;

&lt;h2&gt;April update to-do list&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe Acrobat (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) and Google Chrome (CVE-2026-5281) each had zero-day exploits leading up to Patch Tuesday. Ensure that you are prioritizing remediation of these two products to the latest version.&lt;/li&gt;
	&lt;li&gt;Microsoft SharePoint includes a zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;) and should be investigated as a priority especially if you have known update challenges with your SharePoint environments.&lt;/li&gt;
	&lt;li&gt;The Microsoft Windows OS update this month resolves 133 CVEs (depending on edition) and includes 4 Critical CVEs. This update will resolve a significant number of findings across your environment.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Apr 2026 22:51:36 Z</pubDate></item><item><guid isPermaLink="false">4438f929-aa59-4aee-a8d8-d16555dab909</guid><link>https://www.ivanti.com/blog/march-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>March 2026 Patch Tuesday</title><description>&lt;p&gt;March Patch Tuesday resolves 79 CVEs, of which three are Critical and 76 are Important. There are two publicly disclosed CVEs this month, but none exploited. Microsoft has also released an Edge update resolving nine Chrome CVEs. The public disclosures include a Denial-of-Service vulnerability in .Net and an Elevation of Privilege vulnerability in SQL Server. Both disclosures are listed as Unproven for Exploit Code Maturity indicating the disclosures did not include any code samples.&lt;/p&gt;

&lt;p&gt;Adobe and Mozilla have released updates as part of the March Patch Tuesday including eight updates from Adobe resolving a total of 80 CVEs, 21 of which are rated Critical. Mozilla Firefox 148.0.2 released resolving three high severity CVEs.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerability&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in SQL Server (CVE-2026-21262). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker who successfully exploited this vulnerability could gain SAL sysadmin privileges. The vulnerability affects SQL Server 2016 and later editions.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Denial of Service vulnerability in .NET (CVE-2026-26127). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.5, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker could cause an out-of-bounds read in .NET allowing an unauthorized attacker to deny service over a network. The vulnerability affects .NET 9 and 10 on Windows, Mac OS and Linux as well as NuGet 9 and 10 packages.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released eight updates this month resolving a total of 80 CVEs, 21 of which are rated Critical. Adobe Commerce is the highest priority this month with a Priority 2 rating. Other affected products include Adobe Illustrator, Substance 3D Painter, Acrobat and Acrobat Reader, Premier Pro, Experience Manager, Substance 3D Stager, and DNG SDK.&lt;/p&gt;

&lt;p&gt;Mozilla has released an update for Firefox 148.0.2 resolving three High severity vulnerabilities.&lt;/p&gt;

&lt;h2&gt;March update to-do list&lt;/h2&gt;

&lt;p&gt;The Microsoft OS and Office updates will resolve the majority of the CVEs resolved this month in two easy updates.&lt;/p&gt;

&lt;p&gt;Mozilla Firefox, Microsoft Edge and Google Chrome are all released frequently. Prioritize browser updates on a weekly or daily basis to reduce risks continuously with minimal risk of impact.&lt;/p&gt;
</description><pubDate>Tue, 10 Mar 2026 21:01:35 Z</pubDate></item><item><guid isPermaLink="false">613c7534-d87d-411a-8d02-57955ea3c5e1</guid><link>https://www.ivanti.com/blog/february-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>February 2026 Patch Tuesday</title><description>&lt;p&gt;February Patch Tuesday includes recent out-of-band updates from Microsoft between January 17th and 29th, including multiple bug fixes and a fix for a zero-day exploit in Microsoft Office. In addition, Microsoft announced the phased disablement of NTLM precede the February 2026 Patch Tuesday release.&lt;/p&gt;

&lt;p&gt;For the February Patch Tuesday release, Microsoft has resolved 57 unique CVEs. Six CVEs are flagged as Exploited and three of those are Publicly Disclosed as well. Add the out-of-band (OOB) zero-day and you have a lineup of CVEs that need some attention.&lt;/p&gt;

&lt;h2&gt;January Out-of-Band Releases&lt;/h2&gt;

&lt;p&gt;The first OOB release on January 17th resolved a credential prompt failure when attempting remote desktop or remote appliance connections. The second round of OOB updates occurred on January 24th and 26th resolving application crashes in Outlook and OneDrive, and system hibernation/shut down issues. And finally, the third OOB update on January 26th was a zero-day vulnerability &amp;nbsp;CVE-&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;2026-21509&lt;/a&gt;, a Microsoft Office Security Feature bypass vulnerability.&lt;/p&gt;

&lt;h2&gt;Microsoft plans phased NTLM disablement&lt;/h2&gt;

&lt;p&gt;Microsoft released their plan for the&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt;&amp;nbsp;of New Technology LAN Manager (NTLM) in the latest operating systems starting now in 2026 and beyond. The NTLM authentication protocol was introduced back in 1993 and has since been superseded by Kerberos protocols, which are far more secure. However, NTLM has remained the fallback when Kerberos is unavailable despite being deprecated and having weak algorithms.&lt;/p&gt;

&lt;p&gt;Phase one introduces additional auditing to help identify where NTLM may still be running and&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-8-%E2%80%93-disabling-ntlm/4485782" rel="noopener" target="_blank"&gt;changing it out&lt;/a&gt;&amp;nbsp;where you can. Starting now, Microsoft recommends using&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/overview-of-ntlm-auditing-enhancements-in-windows-11-version-24h2-and-windows-server-2025-b7ead732-6fc5-46a3-a943-27a4571d9e7b" rel="noopener" target="_blank"&gt;advanced NTLM auditing&lt;/a&gt;&amp;nbsp;already available in Server 2025, and Windows 11 24H2 and newer. Phase two begins with major OS updates coming later this year. This update will address the ‘pain points’ or blockers by removing multiple fallback scenarios where Kerberos reverts back to NTLM.&lt;/p&gt;

&lt;p&gt;And finally in phase three, NTLM will be disabled by default. The code will still be there, but you will need to explicitly re-enable it if absolutely needed. This three-phase approach will happen quickly, so plan appropriately to replace NTLM in your environment and take a giant security step forward. The ‘NTLM disabled by default’ phase will occur with the next major Server update.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;On January 29th, Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Office (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;CVE-2026-21509&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can send a user a malicious Office file and convince them to open the file to exploit the vulnerability. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Remote Desktop Services (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533" rel="noopener" target="_blank"&gt;CVE-2026-21533&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519" rel="noopener" target="_blank"&gt;CVE-2026-21519&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in MSHTML Framework (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513" rel="noopener" target="_blank"&gt;CVE-2026-21513&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Windows Shell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510" rel="noopener" target="_blank"&gt;CVE-2026-21510&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514" rel="noopener" target="_blank"&gt;CVE-2026-21514&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can bypass a security feature locally due to a reliance on untrusted inputs. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Denial of Service vulnerability in Windows Remote Access Connection Manager (CVE-2026-21525). The vulnerability is rated Moderate by Microsoft and has a CVSS v3.1 score of 6.2, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. A null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for February. The update affects Ivanti Endpoint Manager and resolves two new CVEs and 11 medium severity CVEs that were disclosed in late 2025. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/february-2026-security-update"&gt;February Security Advisory&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, there was a security advisory on January 29th for Ivanti Endpoint Manager Mobile (EPMM) that had a limited number of customers impacted at time of disclosure. Ivanti urges all customers using the on-prem EPMM product to promptly install the Security Update. The security advisory, additional technical analysis, and an Exploitation Detection script co-developed with NCSC-NL can be found in the &lt;a href="https://www.ivanti.com/blog/january-2026-epmm-security-update"&gt;January Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates this month resolving 43 CVEs, 27 of which are Critical. All nine updates are rated Priority three by Adobe.&lt;/p&gt;

&lt;h2&gt;February update to-do list&lt;/h2&gt;

&lt;p&gt;Windows OS and Microsoft Office updates are priority this month resolving six new and one OOB zero-day exploits.&lt;/p&gt;

&lt;p&gt;Review Microsoft&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt; of NTLM announcement and documentation to start planning for the deprecation and disablement of NTLM.&lt;/p&gt;
</description><pubDate>Tue, 10 Feb 2026 21:58:44 Z</pubDate></item><item><guid isPermaLink="false">7bbd54ed-d35c-4e94-b814-6920a467a5e7</guid><link>https://www.ivanti.com/blog/january-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>January 2026 Patch Tuesday</title><description>&lt;p&gt;New year,&amp;nbsp;new updates!&amp;nbsp;Welcome back to the Ivanti Patch Tuesday blog where we&amp;nbsp;provide&amp;nbsp;you&amp;nbsp;critical insights to&amp;nbsp;optimize&amp;nbsp;your exposure management activities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This month there are a pair of Mozilla CVEs that are suspected&amp;nbsp;of being&amp;nbsp;exploited and a Microsoft CVE that has been exploited.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, Microsoft has a pair of&amp;nbsp;publicly disclosed vulnerabilities that will need to be reviewed to see if your organization may be&amp;nbsp;impacted&amp;nbsp;by the changes Microsoft is making.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There are&amp;nbsp;additional&amp;nbsp;third-party&amp;nbsp;updates&amp;nbsp;from Adobe,&amp;nbsp;and&amp;nbsp;you should&amp;nbsp;expect more from Google and Oracle over the next few days and into next week&amp;nbsp;that should be included in your monthly maintenance.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A side note of good news:&amp;nbsp;Microsoft has broken the Server 2025&amp;nbsp;update out&amp;nbsp;into a separate KB,&amp;nbsp;so it is only&amp;nbsp;1.9GB in size,&amp;nbsp;versus this month’s&amp;nbsp;4GB+ Windows 11 cumulative update.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an&amp;nbsp;Information Disclosure vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805" rel="noopener" target="_blank"&gt;CVE-2026-20805&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 5.5, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. The exposure could be used to&amp;nbsp;disclose&amp;nbsp;a section address from a remote ALPC port&amp;nbsp;that&amp;nbsp;is user-mode memory. The vulnerability affects all currently supported and extended security update-supported versions of the Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a&amp;nbsp;Security Feature Bypass vulnerability in Secure Boot Certification Expiration&amp;nbsp;(&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265" rel="noopener" target="_blank"&gt;CVE-2026-21265&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of&amp;nbsp;6.4,&amp;nbsp;but&amp;nbsp;it&amp;nbsp;has been publicly&amp;nbsp;disclosed.&amp;nbsp;In&amp;nbsp;addition&amp;nbsp;the update, the&amp;nbsp;fix&amp;nbsp;provides a warning&amp;nbsp;regarding&amp;nbsp;certificates that will be expiring in 2026&amp;nbsp;and details on actions that are&amp;nbsp;required&amp;nbsp;to up&amp;nbsp;renew&amp;nbsp;certificates&amp;nbsp;prior to their&amp;nbsp;expiration.&amp;nbsp;It is recommended to start investigating what actions your organization may need to take to prevent potential serviceability and security as certificates expire.&amp;nbsp;  &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft is addressing&amp;nbsp;an&amp;nbsp;Elevation of Privilege vulnerability in Windows Agere Soft Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-31096" rel="noopener" target="_blank"&gt;CVE-2023-31096&lt;/a&gt;). The vulnerability CVE ID was assigned by MITRE&amp;nbsp;in 2023. It&amp;nbsp;is rated Important and has a CVSS v3.1 score of 7.8.&amp;nbsp;The CVE has been publicly&amp;nbsp;disclosed. Microsoft’s resolution is to remove the affected drivers from the Windows OS as&amp;nbsp;of the January 2026 cumulative update. Microsoft recommends removing any existing dependencies on this hardware.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released no security advisories this month.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/" rel="noopener" target="_blank"&gt;Mozilla has released updates for Firefox and Firefox ESR,&amp;nbsp;resolving a total of&amp;nbsp;34&amp;nbsp;CVEs&lt;/a&gt;. All three updates have an Impact rating of High. Two CVEs are suspected to be exploited (CVE-2026-0891 and CVE-2026-0892). Both are resolved in Firefox 147 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/" rel="noopener" target="_blank"&gt;MFSA2026-01&lt;/a&gt;),&amp;nbsp;and CVE-2026-0891 is resolved in Firefox ESR 140.7 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/" rel="noopener" target="_blank"&gt;MFSA2026-03&lt;/a&gt;).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Expect Google Chrome and Microsoft Edge updates this week in addition to a high-severity vulnerability in Chrome WebView that was resolved in the January 6 Chrome update (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe&amp;nbsp;has released 11 updates this month affecting&amp;nbsp;DreamWeaver, InDesign,&amp;nbsp;Illustrator, InCopy, Bridge, Substance 3D Modeler, Stager, Painter,&amp;nbsp;Sampler&amp;nbsp;and Designer and&amp;nbsp;Coldfusion.&amp;nbsp;Coldfusion&amp;nbsp;is a priority 1. Everything else is priority 3, but most of the updates include Critical CVEs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Oracle’s Quarterly CPU is scheduled to&amp;nbsp;release&amp;nbsp;on January 20, so be prepared for updates for Oracle solutions, including Java. Once the Java release is out,&amp;nbsp;expect&amp;nbsp;all of&amp;nbsp;the Java-based frameworks to update over the next few weeks.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;January update&amp;nbsp;to-do&amp;nbsp;list&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Browser updates are a priority this month. Mozilla resolved two suspected zero-day exploits (CVE-2026-0891 and CVE-2026-0892),&amp;nbsp;and Chrome resolved a high-severity CVE (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The Windows OS update resolves one exploited and two publicly disclosed vulnerabilities this month,&amp;nbsp;putting the Windows OS update as top priority this month&amp;nbsp;alongside&amp;nbsp;the browser updates.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Review Secure Boot Certificate timelines and usage of Agere Soft Modem drivers&amp;nbsp;to avoid serviceability and security issues.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 Jan 2026 21:52:53 Z</pubDate></item><item><guid isPermaLink="false">f6313797-d456-4178-8477-933be69ec3b9</guid><link>https://www.ivanti.com/blog/december-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>December 2025 Patch Tuesday</title><description>&lt;p&gt;Here we are at the final Patch Tuesday for 2025. Microsoft has resolved 56 CVEs (two Critical and 54 Important). Included in this release is one known exploited (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and two publicly disclosed CVEs (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). This month’s OS update resolves the exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and one of the public disclosures (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;), making the Windows OS a top priority this month. The other public disclosure is in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;), which would require developers to download and update the GitHub Copilot plugin.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Third-party updates this Patch Tuesday include multiple releases from Mozilla for Firefox 146 and Firefox ESR 115.31 and 140.6. Adobe released five updates to resolve 142 CVEs including an update for Adobe Acrobat and Reader. Four of five updates are rated as Priority Three, but the Adobe ColdFusion update is rated Priority One. There are no known exploits, but the ColdFusion update resolves the bulk of the CVEs resolved by Adobe this month.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Cloud Files Mini Filter Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but is confirmed to be exploited in the wild. An attacker who successfully exploits this CVE could gain SYSTEM privileges. The CVE affects Windows 10 and later Windows editions. A risk-based prioritization approach would prioritize this CVE as Critical.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in PowerShell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but has been publicly disclosed. The fix provides a warning and guidance to avoid the potential remote code execution, but the nature of the exposure makes it improbable to fully remediate. The Invoke-WebRequest command can parse the contents of a web page and could potentially run script code in the web page when it is parsed. A warning is presented recommending the use of the -UseBasicParsing switch to avoid script code execution. The CVE affects Server 2008 and later Windows editions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.4 but has been publicly disclosed. An attacker could exploit code using a malicious Cross Prompt Inject in untrusted files or MCP servers, allowing the execution of additional commands by appending them to commands allowed in the user’s terminal auto-approve setting.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update this month. The update affects Ivanti Endpoint Manager and resolves four vulnerabilities. More details and information about mitigations can be found in the &lt;a href="https://www.ivanti.com/blog/december-2025-security-update"&gt;December Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Mozilla has released updates for Firefox and Firefox ESR resolving a total of 27 CVEs. All three updates have an Impact rating of High.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Adobe released five updates this month affecting ColdFusion, Experience Manager, DNG SDK, Acrobat and Reader and Creative Cloud Desktop. ColdFusion is a Priority One and resolves the majority of the 142 CVEs. The other four updates are rated Priority Three.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;December update priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The Windows OS update is the priority this month to resolve &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;All other updates can be resolved under normal SLA priorities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 09 Dec 2025 22:05:21 Z</pubDate></item><item><guid isPermaLink="false">77e51b29-a602-4d2a-92ee-011a73cea9bd</guid><link>https://www.ivanti.com/blog/unpatchable-vulnerabilities-risk-mitigation-strategies</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><title>Unpatchable Vulnerabilities: Key Risk Mitigation Strategies</title><description>&lt;p&gt;Wouldn’t it be great if every vulnerability had a fix waiting in the wings? If patching were always fast, easy, and complete?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s not the world we live in.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Some vulnerabilities can’t be patched at all. Others are buried in systems or services you don’t fully control. And the longer your focus stays limited to internal infrastructure, the more risk slips through the cracks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is where the conversation broadens, from vulnerability management to full spectrum &lt;a href="https://www.ivanti.com/glossary/exposure-management"&gt;exposure management&lt;/a&gt;. Because unpatchable vulnerabilities aren’t edge cases. They're part of your everyday risk landscape and deserve a seat at every CISO’s table.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The problem? Too many organizations still equate vulnerability management with patching, and that mindset creates blind spots big enough for attackers to walk right through. It ignores the exposures lurking outside traditional infrastructure: Cloud misconfigs, expired certs, &lt;a href="https://www.ivanti.com/blog/software-supply-chain-attack-risk"&gt;third-party software dependencies&lt;/a&gt;, identity abuse and more.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What are unpatchable vulnerabilities?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Unpatchable vulnerabilities live up to their name. They’re flaws you can’t fix with a vendor patch, and not as rare as you might think. In today’s environment, risk is as likely to come from a cloud misconfiguration or expired certificate as it is from a missing update. But if your strategy focuses only on infrastructure vulnerabilities, you’re leaving massive gaps in your defenses.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Most teams lack total &lt;a href="https://www.ivanti.com/blog/attack-surface-visibility-gaps"&gt;attack surface visibility&lt;/a&gt; and treat infrastructure as the entire &lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;attack surface&lt;/a&gt;. Full stop. But that’s only one layer in a much broader landscape. The reality is that there are five critical layers where vulnerabilities live, and only one of them can be reliably managed with traditional patching.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/unpatchable-blog_attack-surface-graphic.png"&gt;&lt;/p&gt;

&lt;p&gt;The rest? They're unpatchable by nature. And each requires a different approach if you want to close the gaps. Let’s go through each one at a time:&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1. Infrastructure&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Infrastructure is the attack surface layer that everyone knows. It’s where traditional vulnerability management and patch management lives. And yes, it’s critical. But treating this as the whole (or only) attack surface is like locking your front door and ignoring the open windows.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;2. External attack surface&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;external attack surface&lt;/a&gt; is what an adversary sees when they look at your organization from the outside. Your domains, subdomains and exposed services are entry points you don’t always control directly and often aren’t picked up in infrastructure scans.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3. Cloud services&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Cloud misconfigurations are one of today’s most dangerous blind spots and also among the most overlooked, particularly in environments that have rapidly adopted cloud services without simultaneously evolving their security practices. We’ve seen the headlines about data exposed through misconfigured storage buckets or overly permissive APIs. These aren’t software flaws. They’re setup mistakes, and no patch can fix a poorly set permission.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;4. Identity&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Then there’s identity. Every user account, credential and session token is a target. If a threat actor phishes your credentials or cracks a weak password, they’re not even exploiting a system vulnerability. They’re using your systems exactly as designed. Don’t mistake identity for a layer of access control. It serves as its own attack surface.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;5. Data&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;And finally: data. The way you classify, store and secure data all represent a surface area always being probed by attackers. If sensitive information is in the wrong place, with the wrong permissions, that’s an open invitation.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patching is critical. It gives you remediation coverage on endpoints and servers. But it only addresses one piece of the puzzle. The rest of your environment requires a wider lens.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The reality is: exposures aren’t buried in code. They live in misconfigurations, overly broad permissions, architectural shortcuts and legacy systems either forgotten or left to rot in the background. Those don’t get fixed with a patch. They get fixed with strategy.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Examples of unpatchable vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.cybersecuritydive.com/news/log4j-haunts-security-community/702011/" rel="noopener" target="_blank"&gt;Log4j&lt;/a&gt; was a wake-up call. A single vulnerable library embedded across dozens of applications, many of them business-critical. You couldn’t just “push a patch”. You had to wait for each vendor to update their software, and/or manually disable vulnerable components until you closed that hole.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s just one example of how complexity can derail vulnerability management. Other cases are even more problematic:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-iiot"&gt;IoT devices&lt;/a&gt; often operate as closed systems, with firmware controlled entirely by the vendor. If vendor support ends, you’re left with internet-connected assets that IT can’t update directly as firmware is locked behind vendor-controlled gates. Without updates, vulnerabilities remain exposed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Network Edge Devices (Firewalls, VPNs, etc.) come with layers of complex rules, configurations and dependencies, configurations and dependencies that can’t be blindly updated. Every change must be tested against business-critical services to avoid outages. One single misstep can knock systems offline or break key integrations. That’s why most teams treat these updates like surgical procedures: slow, meticulous and weighed carefully against the organization’s &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And then there’s cryptographic decay. It’s the slow decay of trust in encryption as attackers get faster and standards grow older. TLS and SSL protocols, once considered rock solid, become exploitable over time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And none of them can be addressed by traditional patching models. They live outside the boundaries of what scanners catch and patching can solve. That’s why a broader security strategy, one rooted in exposure reduction and not just patching, needs to guide your approach.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Multifaceted risk mitigation strategies&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Start by targeting the weakest links in your environment: outdated protocols, misconfigurations and overexposed assets. Then, assess who and what has access to your systems. Shrink those access pathways to only what’s essential. This reduces the damage radius when something goes wrong.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Next, break risk mitigation into multiple workstreams. Not every vulnerability can be addressed the same way or on the same timeline. You need parallel tracks for short-term containment and long-term resilience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the short term, if you're facing an unpatchable vulnerability, ask: how do we minimize impact now? The Log4j response is a good model. There, we deployed scripts that disabled vulnerable components in real time, limiting exposure while waiting for a vendor patch.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At the same time, build a longer-term framework. Automate configuration updates wherever possible. Create a roadmap for phasing out end-of-life apps and platforms. Map ownership across critical systems, including which teams or vendors control updates and what permissions or dependencies might block timely fixes. When an issue arises, that prep work determines whether you're reacting in chaos or executing a plan.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The tactics will vary — scripts, segmentation, zero trust, re-architecture — but the goal stays the same: reduce the time and space adversaries have to exploit your systems. Shrink the window. Stay ahead of it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The organizations that succeed in managing unpatchable vulnerabilities are the ones who understand their environment inside and out. They never stop refining that understanding. That means having a real-time asset inventory, visibility into what’s running where and a comprehensive Software Bill of Materials (SBOM) that tells you what’s inside your software.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They also monitor the entire attack surface. Not just endpoints, but external perimeters, cloud configurations, identity systems, and the data itself. Anything less than that leaves blind spots wide open.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;They build tight operational bridges between teams. When a high-risk exposure surfaces, network ops, application owners and developers already know who’s on point, what actions to take and how to move fast without triggering service disruptions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Above all, they know that “unpatchable” doesn’t mean unmanageable. It just means you need a different playbook: one that’s layered, cross-functional and laser-focused on reducing real-world risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For more on how to elevate your approach to vulnerability management and risk mitigation, check out Ivanti’s research report: &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch" target="_blank"&gt;Risk-Based Patch Prioritization&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 20 Oct 2025 13:00:00 Z</pubDate></item><item><guid isPermaLink="false">9e9a6540-2b98-4a64-9124-117518ba31b4</guid><link>https://www.ivanti.com/blog/october-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>October 2025 Patch Tuesday</title><description>&lt;p&gt;October Patch Tuesday is going to be a busy one from all angles. Microsoft exceeded the January CVE count (159 CVEs) by a healthy margin, with 172 CVEs resolved this month. There are three exploited and two publicly disclosed vulnerabilities this month, but fortunately all of them are in the cumulative OS update, making resolution quick and clean. They are also end of life-ing a lot of products, including Windows 10! Additionally, Office 2016 and 2019 and Exchange Server 2016 and 2019 have also reached end of life.&lt;/p&gt;

&lt;p&gt;Adobe released 12 updates resolving 36 CVEs. Mozilla released five updates resolving 45 CVEs and are cautioning users that three of these CVEs are showing signs they may have been exploited in the wild (unconfirmed). And of course, Google Chrome is expected to release their weekly update in the next 24 hours.&lt;/p&gt;

&lt;p&gt;There is a lot to unpack, so let’s get started.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Secure Boot bypass in IGEL OS before 11 vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827" rel="noopener" target="_blank"&gt;CVE-2025-47827&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 4.6. Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature, allowing a crafted root file system to be mounted from an unverified image.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Remote Access Connection Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230" rel="noopener" target="_blank"&gt;CVE-2025-59230&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8. Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990" rel="noopener" target="_blank"&gt;CVE-2025-24990&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8.&amp;nbsp; The driver shipped natively with the Windows OS. Microsoft has removed the driver with the October cumulative update and recommends removing any existing dependencies on this fax modem hardware. Exploit is possible even if the drive is not being used. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052" rel="noopener" target="_blank"&gt;CVE-2024-24052&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 7.8. The exploit code maturity is listed as proof-of-concept, which increases the risk of exploitation. A risk-based prioritization methodology would warrant treating this as Critical.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an out-of-bounds read vulnerability in TCG TPM2.0 reference implementation (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884" rel="noopener" target="_blank"&gt;CVE-2024-2884&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 5.3. The exploit code maturity is listed as unproven, indicating there is currently no publicly available code.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates and one Security Advisory for October Patch Tuesday, resolving a total of seven CVEs. The affected products include Ivanti Neurons for MDM and Ivanti Endpoint Manager Mobile. The Ivanti Neurons for MDM vulnerabilities were resolved for all customers on October 10, 2025. An additional Security Advisory was released for Ivanti Endpoint Manager, which provides mitigation options for vulnerabilities disclosed October 7, 2025.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/october-2025-security-update"&gt;October Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released 12 updates addressing 36 CVEs. Adobe has rated the Commerce update as a priority two and the rest of the updates as priority three.&lt;/li&gt;
	&lt;li&gt;Mozilla released five updates resolving 45 CVEs. Three of the CVEs included variations of the statement, “Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code,” indicating a possibility of exploitation in the wild. All five updates include at least one of the suspected exploit CVEs, we recommend treating all five as containing a known exploited CVE.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release in the next 24 hours, so plan a Chrome update and a possible Edge update shortly after.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;October update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS cumulative update is the top priority this month, as it resolves three exploited and two publicly disclosed CVEs.&lt;/li&gt;
	&lt;li&gt;All Mozilla updates should be deployed during your current maintenance, but any deferral or delay would come with risks as there are three CVEs that are speculated to be exploitable in the wild already.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Oct 2025 21:43:03 Z</pubDate></item><item><guid isPermaLink="false">3048b2b0-01d6-484d-8894-668a44ac732a</guid><link>https://www.ivanti.com/blog/continuous-vulnerability-management</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Security</category><title>Schrödinger’s Vulnerability: Why Continuous Vulnerability Management Isn’t Optional</title><description>&lt;p&gt;The classic thought experiment known as &lt;a href="https://www.newscientist.com/definition/schrodingers-cat/" rel="noopener" target="_blank"&gt;Schrödinger’s Cat&lt;/a&gt; imagines a cat that’s simultaneously alive and dead; that is, until someone opens the box. In other words, it’s both alive and dead until the point that we can confirm the truth.&lt;/p&gt;

&lt;p&gt;Now, swap the cat for software vulnerabilities, and you’ve got a fantastic analogy for what happens in today’s security environment. Teams won’t know a vulnerability exists until it’s discovered and in the worst cases, until it’s already being exploited.&lt;/p&gt;

&lt;p&gt;That uncertainty is what I call &lt;em&gt;&lt;strong&gt;Schrödinger’s vulnerability&lt;/strong&gt;&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;It’s the gap between the assumption of safety and the reality of exposure. And it’s a gap that traditional vulnerability management practices alone can’t bridge.&lt;/p&gt;

&lt;p&gt;With threat actors leveraging automation and AI to enhance the speed and scale of their attacks, the time between the discovery of a vulnerability and exploitation is shrinking. Organizations can’t afford to waste time identifying and &lt;a href="https://www.ivanti.com/resources/time-to-patch"&gt;patching vulnerabilities&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Traditional patching methods are on a fixed cadence – once a month or once a week – but this approach is out of touch with the realities of modern threats.&lt;/p&gt;

&lt;p&gt;Organizations need to branch out from relying just on reactive, scheduled &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;patch management&lt;/a&gt; and remediation cycles. It’s time we shift our mindset to an always-on, comprehensive way of understanding a potential vulnerability – even before we know that the vulnerability exists.&lt;/p&gt;

&lt;h2&gt;The Patch Tuesday problem: real-world threats move faster&lt;/h2&gt;

&lt;p&gt;Let’s start with what we all know: &lt;a href="https://www.ivanti.com/resources/patch-tuesday"&gt;Patch Tuesday&lt;/a&gt; is predictable. Patch Tuesday remains an important practice in helping security teams prioritize their updates and remediate newly-identified vulnerabilities. Leading tech companies like Microsoft, Apple and Ivanti itself release their updates and patches on a regular cycle, giving IT and security teams time to prepare their own maintenance cycles.&lt;/p&gt;

&lt;p&gt;However, the problem is that many vulnerabilities aren't so predictable.&lt;/p&gt;

&lt;p&gt;For example, popular third-party applications such as Adobe, Mozilla and Google are continuously releasing updates to common applications — such as browsers — that we all use on a daily basis.&lt;/p&gt;

&lt;p&gt;For organizations only anchored to a monthly maintenance schedule, this can create a dangerous delay. Each time you “close the box” and wait for the next patch window, you leave a 29-day exposure gap wide open.&lt;/p&gt;

&lt;p&gt;Consider what happened in the spring months of 2025: in the span of five weeks, Chrome, Edge and Firefox each identified zero-day vulnerabilities that required immediate attention:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Two Firefox vulnerabilities &lt;a href="https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html" rel="noopener" target="_blank"&gt;publicly exploited at the Pwn2Own hacker competition&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.helpnetsecurity.com/2025/07/16/update-google-chrome-to-fix-actively-exploited-zero-day-cve-2025-6558/" rel="noopener" target="_blank"&gt;An actively exploited zero-day in Chrome&lt;/a&gt; and its sibling browser, Edge&lt;/li&gt;
	&lt;li&gt;Multiple rapid-fire CVE disclosures demanding swift action&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Modern cyber attackers can reverse-engineer newly released patches to uncover the underlying vulnerability, weaponize proof-of-concept exploits and launch automated attacks.&lt;/p&gt;

&lt;p&gt;Once a vulnerability is publicly disclosed, you enter a critical window to resolve the issue before threat actors can take advantage of it. In fact, the June 2025 zero-day in Chrome (CVE-2025–5419) was actively exploited in the wild upon patch release, underscoring how quickly adversaries can weaponize a disclosed flaw.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday timeline of events from May-June 2025" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-graphic-1-patch-timeline.jpg"&gt;&lt;/p&gt;

&lt;p&gt;To extend our Schrödinger’s analogy: vulnerability management is like herding cats. And as anyone who’s tried to herd cats knows, it’s a 24/7, round-the-clock job. In other words, &lt;a href="https://www.ivanti.com/blog/continuous-vulnerability-management-is-a-must"&gt;continuous vulnerability management&lt;/a&gt; is even more crucial now than before.&lt;/p&gt;

&lt;h2&gt;The IT burden: continuous releases and compressed SLAs&lt;/h2&gt;

&lt;p&gt;Threat velocity is only half the challenge. As more vendors shift to continuous release cycles, it forces security teams to shrink SLAs, sometimes dramatically. The result is often “smoke-test validation”, confirming a patch has been installed without fully checking its impact. That’s how bugs, compatibility issues and missed dependencies slip through. You’re increasing operational risk even when trying to reduce security risk. It’s like peeking in the box to see if the cat’s breathing and missing the open window behind it.&lt;/p&gt;

&lt;p&gt;IT teams are struggling to test, validate and deploy patches at that increased pace, &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch"&gt;according to Ivanti research&lt;/a&gt;. Nearly four out of 10 (39%) cybersecurity professionals find it a challenge to prioritize risk remediation and patch deployment, and 35% aren’t consistently able to maintain compliance when patching.&lt;/p&gt;

&lt;p&gt;A different approach is needed. Teams need to be more proactive and continuous in their approach. This means establishing a mindset of &lt;a href="https://www.ivanti.com/glossary/exposure-management"&gt;exposure management&lt;/a&gt; to be more proactive.&lt;/p&gt;

&lt;h2&gt;Risk appetite: the starting point for exposure management&lt;/h2&gt;

&lt;p&gt;Every organization has a different tolerance threshold regarding risk. That’s your &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;. If you haven’t formally defined that in your teams, you can’t operationalize an effective response strategy.&lt;/p&gt;

&lt;p&gt;That’s why continuous vulnerability management starts with a conversation across stakeholders. You must bring security ops, IT and business leadership to the table to address critical questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What level of exposure are we willing to tolerate?&lt;/li&gt;
	&lt;li&gt;How fast can we realistically respond to zero-day threats?&lt;/li&gt;
	&lt;li&gt;What's the financial, operational and reputational cost of being wrong?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;average cost of a ransomware incident is now reported as being upwards of $5 million&lt;/a&gt;. That’s no small sum, and especially for smaller organizations, the high costs may pose an existential threat to their business.&lt;/p&gt;

&lt;p&gt;For enterprises, it’s more the brand damage and regulatory exposure where it stings the most.&lt;/p&gt;

&lt;p&gt;No matter your size, these numbers demand a shift from measuring patching SLAs to actively managing exposure.&lt;/p&gt;

&lt;h2&gt;From cadence to coverage: tiered patch management framework&lt;/h2&gt;

&lt;p&gt;At Ivanti, we’ve operationalized this mindset through a flexible, layered policy framework within our &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Neurons for Patch Management platform&lt;/a&gt;. This starts with three policy tiers that align with real-world vulnerability response patterns:&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch tiers graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-blog-graphic-2-patch-tiers.png"&gt;&lt;/p&gt;

&lt;h3&gt;1. Routine maintenance&lt;/h3&gt;

&lt;p&gt;This is your baseline: OS updates, scheduled, third-party patches, standard hygiene. While essential, it’s insufficient if it stands on its own. You’re keeping the lights on, but you’re not ready when a storm hits.&lt;/p&gt;

&lt;h3&gt;2. Priority updates&lt;/h3&gt;

&lt;p&gt;Browsers, collaboration tools and document apps change constantly, making them prime targets for exploitation. Because of the perpetual change and evolution of these apps, they require faster response cycles and purpose-built policies. We’ve created default configurations to help customers proactively manage these risk-prone applications with minimal friction.&lt;/p&gt;

&lt;h3&gt;3. Zero-Day response&lt;/h3&gt;

&lt;p&gt;Agility matters most here. When a zero-day is discovered and disclosed (or worse, exploited), you don’t have time to debate or argue about what to do in response. You need preconfigured, battle-tested policies that you can pivot to immediately and patch outside your normal cycle.&lt;/p&gt;

&lt;p&gt;These three tiers running parallel to each other give organizations a starting point for moving beyond cadence-based patching. They operationalize the concept of risk appetite by matching prescribed response urgency to the nature of the threat.&lt;/p&gt;

&lt;h2&gt;Multilayered vulnerability management and continuous compliance&lt;/h2&gt;

&lt;p&gt;&lt;img alt="continuous compliance graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-graphic-3-continuous-compliance.jpg"&gt;&lt;/p&gt;

&lt;p&gt;Not every system is perfect, though. What happens when something falls through the cracks?&lt;/p&gt;

&lt;p&gt;Maybe an employee was on vacation. Maybe a system was turned off. Maybe a new device was integrated without the latest patches. These are the edge cases that create silent, persistent risk. These are your very own Schrödinger’s vulnerabilities.&lt;/p&gt;

&lt;p&gt;To solve this requires a fourth remediation track: &lt;strong&gt;Continuous Compliance&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;This task runs in the background. It monitors for devices that don’t meet your latest patching baseline from routine to zero-day. When it finds gaps, it closes them &lt;em&gt;automatically&lt;/em&gt;. It’s like a bank’s vault automatically locking shut when thieves trigger the alarm.&lt;/p&gt;

&lt;p&gt;There’s no need to wait for the next Patch Tuesday or have someone manually watch the dashboard 24/7. This is where true continuous vulnerability management takes shape. Ongoing coverage (and security) rather than manual reaction.&lt;/p&gt;

&lt;h2&gt;Shrinking the noise: focus on what matters&lt;/h2&gt;

&lt;p&gt;There’s another critical benefit here: dramatically reducing the volume of noise your security teams have to triage.&lt;/p&gt;

&lt;p&gt;Take July’s &lt;a href="https://www.ivanti.com/resources/patch-tuesday"&gt;Patch Tuesday&lt;/a&gt;. Microsoft released patches for 104 CVEs. Let’s do the math: say you have 3,000 Windows 11 machines in your user base. That means more than 300,000 “findings” for your vulnerability scanner.&lt;/p&gt;

&lt;p&gt;But here’s the thing: if your exposure management program is doing its job, 99% of those findings are already addressed and accounted for in your routine maintenance, priority updates or in your zero-day response tasks. No more needing to parse through mountains of redundant alerts – your team can now home in on what needs real attention, including gaps, anomalies and uncompliant systems.&lt;/p&gt;

&lt;p&gt;That’s how you move from reactive alert fatigue to active risk reduction.&lt;/p&gt;

&lt;h2&gt;From patch management to preparedness&lt;/h2&gt;

&lt;p&gt;This, ultimately, is a mindset shift. You’re moving from a reactive model to a proactive one. You’re shifting from waiting for vulnerabilities to surface and deciding what to do about them, to responding with predefined and automated processes firmly in place.&lt;/p&gt;

&lt;p&gt;That’s the difference between simply patching and being prepared. It matters more now than ever, with CVE counts rising and threat actors faster, smarter and better resourced.&lt;/p&gt;

&lt;p&gt;Regulatory expectations are also growing. Whether it’s SEC disclosure rules, National Institute of Standards and Technology (NIST) frameworks or industry-specific compliance mandates, the bar for “reasonable security” is climbing.&lt;/p&gt;

&lt;p&gt;The baseline has changed: it’s no longer patch and react. It’s continuous vulnerability management.&lt;/p&gt;

&lt;h2&gt;Not falling for Schrödinger’s vulnerability&lt;/h2&gt;

&lt;p&gt;Back to the cat. The whole point of Schrödinger’s Cat thought experiment is that uncertainty persists &lt;em&gt;until you look&lt;/em&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s fun in concept, but it’s dangerous when you apply that mentality to cybersecurity. You can’t just hope you won’t get hit — you must &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;manage risk&lt;/a&gt; through continuous monitoring, patching and enforcing.&lt;/p&gt;

&lt;p&gt;With the right measures in place, you’re not opening the box wondering if a vulnerability is “alive” or not. You’ve already taken steps to keep it safe. You can open with confidence and then shut the window of exposure before it even becomes an open door.&lt;/p&gt;

&lt;p&gt;Discover more best practices to elevate your current patching and remediation efforts to a proactive, high-performing security strategy in our full &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch"&gt;Risk-Based Patch Prioritization Report&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 17 Sep 2025 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">419bfa61-ee47-4c09-aa89-434ff944ccb0</guid><link>https://www.ivanti.com/blog/september-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>September 2025 Patch Tuesday</title><description>&lt;p&gt;The days leading into September Patch Tuesday include a bit of chaos from a pair of actively exploited Android CVEs (CVE-2025-38352, CVE-2025-48543), a zero day in WhatsApp (CVE-2025-55177), another zero day in WinRAR (CVE-2025-8088), and a major supply chain attack through the Drift AI Chat Agent exposing Salesforce customers data.&lt;/p&gt;

&lt;p&gt;The good news is Microsoft only has a pair of publicly disclosed vulnerabilities (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;) out of 81 total CVEs resolved this month, making this about as close to a calm Patch Tuesday as we can hope for.&lt;/p&gt;

&lt;p&gt;The Windows OS and Office updates are rated Critical this month, putting those as the highest priority, but with no zero-day exploits, this month should be focused on routine maintenance from a Microsoft perspective.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 8.8 and affects all Windows OS editions. The code maturity is unproven, which would indicate no code samples have been disclosed. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Improper Handling of Exceptional Conditions vulnerability in Newtonsoft.Json (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is unrated and affects SQL Server 2016, 2017 and 2019. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial-of-service condition. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates resolving 22 CVEs, 12 of which are rated Critical. The products affected include Adobe Acrobat Reader, After Effects, Premiere Pro, Commerce, Substance 3D Viewer, Experience Manager, Dreamweaver, 3D Substance Modeler and ColdFusion. Adobe has rated the ColdFusion update as a priority one and Commerce as a priority two. The other seven updates are rated priority three.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates for September Patch Tuesday resolving a total of 13 CVEs. The affected products include Ivanti Connect Secure and Policy Secure and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/september-2025-security-update"&gt;September Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;September update priorities&lt;/h2&gt;

&lt;p&gt;With no zero-days released on Patch Tuesday, the updates this month are predominantly low risk. Ensure you have the zero days leading up to Patch Tuesday in hand, and plan to deploy the Microsoft and Adobe updates through your regular maintenance activities this month.&lt;/p&gt;
</description><pubDate>Tue, 09 Sep 2025 21:28:36 Z</pubDate></item><item><guid isPermaLink="false">b5a7b009-4cc8-4f68-a14f-dc3f5f5a0361</guid><link>https://www.ivanti.com/blog/attack-surface-discovery</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Security</category><title>Attack Surface Discovery: How to Identify Your Organization's Attack Surface</title><description>&lt;p&gt;Much like your lawn after a good rain, your &lt;a href="https://www.ivanti.com/glossary/attack-surface"&gt;attack surface&lt;/a&gt; will grow rapidly if left unchecked. And an increase in cybersecurity risk comes along with that increase in attack surface size. While risk can’t be eliminated outright (because attack surfaces are always evolving), you can manage it to keep your overall risk levels in line with your &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why is attack surface discovery so important?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Managing cybersecurity risk begins with identifying your organization’s attack surface. More specifically, you must identify what lurks below the surface — the endpoints, vulnerabilities and other attack vectors that expose your environment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Leading security frameworks agree that attack surface discovery is essential for a strong security posture. For instance, the first Function of the &lt;a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf" rel="noopener" target="_blank"&gt;National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) Version 1.1&lt;/a&gt; is Identify, and NIST states, “The activities in the Identify Function are foundational for effective use of the Framework.” Similarly, CIS Controls v8 contains the following Controls:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Control 1 — Inventory and Control of Enterprise Assets&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Control 2 — Inventory and Control of Software Assets&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Control 7 — Continuous Vulnerability Management&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Put simply, you can’t defend what you don’t know you have. But how do you figure out what you have?&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How do I get started with attack surface discovery?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Attack surface discovery requires you to take an attacker’s view of your organization to find exploitable assets and associated vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Your attack surface has three components: a digital attack surface, a physical attack surface and a human attack surface. Here, we’ll focus primarily on discovering your digital attack surface, although we’ll touch briefly on the other two aspects as well.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Your digital attack surface includes traditional IT assets — hardware, such as endpoints and servers, as well as software applications — and external internet-facing assets, such as web applications, IPs, domain names, SSL certificates and cloud services.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Your first step is to account for each element of your digital attack surface and identify your visibility gaps. You can classify each element as:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Known known:&lt;/strong&gt; Cyber assets that you know are part of your attack surface.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Known unknown:&lt;/strong&gt; Cyber assets that you know are part of your attack surface but that you may not have visibility into and/or don’t have under management.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Unknown unknown:&lt;/strong&gt; Cyber assets that may or may not be part of your attack surface — you don’t know.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;N/A:&lt;/strong&gt; Cyber assets that you know with 100% certainty are not part of your attack surface.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For a more comprehensive overview of your attack surface elements, use our editable &lt;a href="/resources/v/doc/ivi/2870/4280f64b5d84" target="_blank"&gt;attack surface checklist&lt;/a&gt; to take inventory.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Tools for discovering and managing your attack surface&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The next step after classifying your asset types is to figure out what tools or approaches will allow you to close your visibility gaps, turning your known unknowns and unknown unknowns into known knowns.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There are more specific solutions that fall under the broad umbrella of &lt;a href="https://www.ivanti.com/glossary/attack-surface-management-asm"&gt;attack surface management&lt;/a&gt; — cyber asset attack surface management (CAASM), &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;external attack surface management (EASM)&lt;/a&gt; and digital risk protection services (DRPS). These tools aggregate findings to more easily identify vulnerabilities, and some also have capabilities for prioritizing and remediating these vulnerabilities, allowing you to quickly act on attack surface insights and reduce risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But organizations have needed to discover and manage their digital attack surfaces since before ASM solutions became available. Instead of ASM solutions, many organizations have leveraged — and continue to leverage — other approaches to do so.&amp;nbsp;&lt;/p&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="col"&gt;Approach&amp;nbsp;&amp;nbsp;&lt;/th&gt;
			&lt;th scope="col"&gt;Description&amp;nbsp;&lt;/th&gt;
			&lt;th scope="col"&gt;Pros&amp;nbsp;&lt;/th&gt;
			&lt;th scope="col"&gt;Cons&amp;nbsp;&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Asset discovery tools&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Find and inventory hardware and software assets connecting to your network.&amp;nbsp;&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations. Better than spreadsheets.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Can have blind spots, such as shadow IT, third-party systems and line-of-business applications.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Breach and attack simulation (BAS)&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Automatically test threat vectors to gain a deeper understanding of security posture vulnerabilities and validate security controls.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Generates reports on security gaps and&lt;strong&gt; prioritizes remediation based on risk.&amp;nbsp;&lt;/strong&gt;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Only focuses&lt;/strong&gt; on known attacks. Doesn't provide remediation.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Cloud security posture management (CSPM)&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Understand changes in cloud configurations.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Provides real-time visibility into cloud configurations.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Doesn't reveal when configurations drift out of compliance or the potential impact of emerging threats.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Configuration management database (CMDB)&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Track changes made to systems.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Doesn't reveal when configurations drift out of compliance or the potential impact of emerging threats.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Homegrown approach&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Combine spreadsheets, scripts and manual processes to manage attack surface.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Inexpensive or free from a pure cost perspective (overlooking analyst hours).&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Time-consuming and error-prone. Not scalable or real-time.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;IT asset management (ITAM)&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Track and monitor assets through their full lifecycle.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations. Better than spreadsheets.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Only covers&lt;/strong&gt; known and managed assets while overlooking unknown or unmanaged facets of attack surface.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Penetration testing (e.g., automated penetration testing tools and penetration testing as a service)&amp;nbsp;&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Identify vulnerabilities within your network and applications by simulating a cyberattack.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Provides examples&lt;/strong&gt; of security posture and associated budget priorities.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Only focuses&lt;/strong&gt; on the first phase of the cyber kill chain: reconnaissance. Also, results are typically point-in-time and only as good as the penetration testers carrying out the simulation.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Red teaming&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Provides a comprehensive picture of an organization’s cybersecurity posture by staging a cyberattack simulation against networks, applications, physical safeguards and employees.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Goes beyond penetration testing by focusing on other phases of the cyber kill chain. Also goes beyond digital attack surface and touches on physical and human attack surfaces.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Results are typically point-in-time and only as good as the penetration testers carrying out the simulation.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Threat intelligence&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Access information on threats and other cybersecurity issues.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Arms security experts with intelligence on threats and vulnerabilities.&amp;nbsp;&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;&lt;strong&gt;Geared toward organizations&lt;/strong&gt; with highly mature security operations consisting of skilled personnel and extensive resources.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Vulnerability management tools (e.g., scanners)&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Identify and manage vulnerabilities within your infrastructure and applications.&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;Already deployed at most organizations.&amp;nbsp;&amp;nbsp;&lt;/td&gt;
			&lt;td&gt;No visibility into unknown assets. Overwhelming amounts of data.&amp;nbsp;&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;While these methods don’t offer all the capabilities of a purpose-built ASM solution, they still play important roles in an organization’s IT and security practices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In fact, CAASM tools can’t function without data from asset discovery, ITAM, vulnerability management and/or patch management tools. Similarly, EASM complements the threat intelligence and security testing services listed above.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How do I identify my organization’s physical attack surface?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The first major component of your organization’s physical attack surface overlaps with your digital attack surface. This is referred to as the endpoint attack surface, and it’s composed primarily of all the endpoints that connect to your network: desktop computers, laptop, mobile devices and IoT devices. The tools and techniques you use to discover your digital attack surface apply here, too.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The second major component of your physical attack surface is your offices, data centers and other facilities. Again, techniques already used to identify the digital attack surface overlap with the physical attack surface, too. In this case, that’s the physical penetration testing component of red teaming.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How do I identify my organization’s human attack surface?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Identifying your human attack surface begins by looking at your org chart. Anyone associated with your organization who can access sensitive information — or prevent others from accessing that information — contributes to your human attack surface. That includes not just full-time employees but also part-time employees, board members, contractors, partners, vendors, suppliers, temps and others.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Red teaming, a practice used to identify elements of both the digital and physical attack surfaces, can also be used to identify a major component of the human attack surface: employee susceptibility to social engineering.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Improper user privilege assignment is another major contributor to human attack surfaces. Reviewing the systems and data the people that contribute to your human attack surface have access to, plus the levels of access they possess, is another way you can identify parts of that surface.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;I’ve identified my organization’s attack surface. Now what?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Discovering your attack surface is step one on the path to your end goal: remediating the vulnerabilities that pose the greatest risk to your organization. Taken as a whole, this process is called &lt;a href="https://www.ivanti.com/resources/exposure-management-strategy-guide" target="_blank"&gt;exposure management&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Attack surface discovery, as we’ve already discussed, is one of the foundations of your security strategy — if you don’t know it’s there, you can’t protect it. Exposure management adds one more foundational pillar, which is determining your risk appetite. This defines how much risk your organization is willing to take on in pursuit of your goals. (You can use this &lt;a href="https://www.ivanti.com/ty/security/downloads/risk-appetite-statement"&gt;editable template&lt;/a&gt; for your risk appetite statement.)&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With these two foundational elements addressed, you can then assess the vulnerabilities you’ve discovered in your attack surface to determine how much risk they pose for your organization, and whether they are within your risk appetite (a process that we cover in depth in this &lt;a href="/resources/v/doc/ivi/2873/4eb345cbbd7a" target="_blank"&gt;guide to objective cyber risk assessment&lt;/a&gt;).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The vulnerabilities that fall outside your risk appetite are your priorities for remediation, allowing you to focus your efforts where they have the greatest impact.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 18 Aug 2025 09:54:55 Z</pubDate></item><item><guid isPermaLink="false">3ae8d951-7002-41fd-976c-737c26267f79</guid><link>https://www.ivanti.com/blog/august-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>August 2025 Patch Tuesday</title><description>&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="cLNedMpRCyk"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;Let me start this month off with a question. Have you already decided what you are going to do for your remediation plan this month? Think about it for a second. OS updates, productivity apps, browsers, and other apps are already likely under consideration for your August patch maintenance. The real decisions you need to consider are around timing. Do you proceed with your typical Patch Tuesday plan or do you need to accelerate any zero-days, etc?&lt;/p&gt;

&lt;p&gt;What you just thought about was a generalization of defining your risk appetite. There is a lot of discussion across the vulnerability management market about how to modernize vulnerability management. When you think about trends like 32% of 1H 2025 known exploited vulnerabilities (KEVs) being zero-day or 1-day exploits it can feel overwhelming. How do you keep up with a continuous stream of updates? Ideally by defining your outcome and configuring for success.&lt;/p&gt;

&lt;p&gt;If we break this month’s Patch Tuesday down into parallel remediation streams:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Routine Maintenance: Much of what just released today will fall into your reoccurring monthly maintenance which typically starts on Patch Tuesday and runs for two weeks or more depending on your SLAs, OS, productivity apps, third-party apps, etc.&lt;/li&gt;
	&lt;li&gt;Priority updates: Browsers tend to release more frequently (typically weekly) and may warrant a priority update track to keep up with the constant stream of new exposures in your environment. This patch cycle you may be resolving CVEs in multiple browsers from the past four weeks if you don’t have a more frequent update plan in place for the browsers.&lt;/li&gt;
	&lt;li&gt;Zero-day Response: The recent SharePoint exploits are a good example of the disruptive\unpredictable nature of zero-day exploits.&lt;/li&gt;
	&lt;li&gt;Continuous Compliance: The three previous tracks could solve most of your remediation challenges, but what about users who are on vacation, leave of absence, got a new system and shipping bypassed the current month’s maintenance window or installed something new that was not the latest version? Defining a baseline and keeping that updated as new updates pass your quality tests would keep your systems in compliance when the multitude of reasons for drift occur.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft resolved one publicly disclosed vulnerability in Windows Kerberos (CVE-2025-53779). The CVE is an Elevation of Privilege vulnerability that could allow an attacker to gain domain admin privileges. The CVE is rated Medium and has a CVSS score of 7.2. The vulnerability only affects Windows Server 2025.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released thirteen new updates on Patch Tuesday, but the most urgent is the Adobe Experience Manager Forms update released on August 5 resolving two publicly disclosed CVEs (CVE-2025-54253 and CVE-2025-54254). &lt;a href="https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html" rel="noopener" target="_blank"&gt;APSB25-82&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Google Chrome 139.0.7258 released resolving five CVEs and is rated Critical. This will also affect Microsoft Edge so watch for that update to come likely later this week.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;August update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft SharePoint is the top priority this month to resolve recent zero-day exploits being targeted by multiple nation state level threat actors. Update ASAP.&lt;/li&gt;
	&lt;li&gt;Adobe Experience Manager Forms update released on August 5 is your second highest priority.&lt;/li&gt;
	&lt;li&gt;Windows OS and Office have Critical CVEs this month. Get them updated as part of your regular maintenance and you should be good.&lt;/li&gt;
	&lt;li&gt;Microsoft Exchange Server and SQL Server each received updates. The CVEs were only rated as Important so no need to escalate remediation, but server admins should start to test and rollout within the next month.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 12 Aug 2025 22:08:03 Z</pubDate></item><item><guid isPermaLink="false">d95dc7b1-8024-40d9-915e-a4549e38b7fa</guid><link>https://www.ivanti.com/blog/july-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>July 2025 Patch Tuesday</title><description>&lt;p&gt;July Patch Tuesday is a sizable one, but no significant security risk. Microsoft resolved 130 new CVEs, including one public disclosure. There are seven additional CVEs from MITRE regarding vulnerabilities in Git resolved through the Visual Studio update this month. Fourteen CVEs are rated Critical by Microsoft, affecting Windows OS, Office, SharePoint, and SQL.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The DHCP issue caused by the June 2025 update appears to be resolved. It is not reported as a known issue for Windows OS KBs, and some quick querying through Gemini agrees the issue appears to be resolved.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Gemini’s response to the query is below:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;July update server DHCP issue resolved&lt;/p&gt;

&lt;p&gt;Yes, according to information available on July 8, 2025, Microsoft has resolved the DHCP server issue that was caused by the June 2025 security updates.&lt;/p&gt;

&lt;p&gt;Key points:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;June 2025 updates caused the problem: Microsoft's June 2025 Patch Tuesday updates introduced a bug that could cause the DHCP service to freeze or stop responding on Windows Server 2016 through 2025. This issue prevented some clients from renewing their IP addresses.&lt;/li&gt;
	&lt;li&gt;Fix released in July updates: Microsoft released Windows updates on July 8, 2025, and subsequent updates that resolve this issue.&lt;/li&gt;
	&lt;li&gt;Workaround before the fix: Before the July updates were available, the recommended workaround was to uninstall the affected June updates and restart the server, but this left systems vulnerable to security threats patched in those updates.&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Windows Server OS updates this month resolve 16 CVEs in Windows Routing and Remote Access Service (RRAS). These vulnerabilities could allow an unauthenticated attacker to convince a user to initiate a connection to a malicious server that could allow them to execute arbitrary code. The attack would require no privileges and could be exploited over the network. Applying the updates to the OS is the best solution, but additional mitigations like restricting RRAS ports to trusted networks or VPN concentrators can limit exposure, as well as employing firewall rules and disabling unused RRAS features.&lt;/p&gt;

&lt;p&gt;Developers have a bit of work to do on their side this month. Microsoft resolved seven CVEs in Git and two additional CVEs that require a Visual studio update this month.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure in Microsoft SQL (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49719" rel="noopener" target="_blank"&gt;CVE-2025-49719&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 7.5. The code maturity is unproven, which would indicate no code samples. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Google Chrome resolved their fourth zero-day exploit on June 30, so from a risk-based prioritization perspective, Chrome and Edge updates that take the focus leading up to Patch Tuesday. &lt;a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html" rel="noopener" target="_blank"&gt;CVE-2025-6554&lt;/a&gt; was resolved in build 138.9.7204.96/.97 for Windows, 138.0.7204.92/.93 for Mac and 138.0.7204.92 for Linux, which they indicated would roll out over the coming days/weeks.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released three updates for July Patch Tuesday resolving a total of 11 CVEs. The affected products include Ivanti Connect Secure and Policy Secure, Ivanti EPMM and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/july-security-update-2025"&gt;July Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;July update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Google Chrome and Microsoft Edge browsers are the top priority this month. Ensure you have deployed the latest updates to resolve the zero-day exploit (&lt;a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html" rel="noopener" target="_blank"&gt;CVE-2025-6554&lt;/a&gt;) that was identified on June 30.&lt;/li&gt;
	&lt;li&gt;Windows Server OS updates are likely the biggest security priority this month, especially for those who experienced the DHCP issues after the June update and had to uninstall the June update.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Jul 2025 21:17:47 Z</pubDate></item><item><guid isPermaLink="false">ba181d8d-6bbb-41d4-9d70-0216bae9cdd8</guid><link>https://www.ivanti.com/blog/june-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>June 2025 Patch Tuesday</title><description>&lt;p&gt;June Patch Tuesday is upon us. There has been a lot of activity in the past few weeks. Mid-May was the &lt;a href="https://www.zerodayinitiative.com/blog?tag=Pwn2Own" rel="noopener" target="_blank"&gt;Pwn2Own Berlin 2025 event&lt;/a&gt;, and the $1M USD in rewards that were paid out came with many newly discovered vulnerabilities affecting Microsoft, Google, Mozilla, VMware, NVIDIA, Oracle and other vendors. Since the event, there have been several updates from many of these vendors, so expect a lot of third-party updates to update this month from releases leading up to Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Microsoft released updates resolving 66 CVEs, nine of which are rated Critical. In addition, there is one public disclosure and one zero-day exploit. Updates this month affect Windows, Office, SharePoint, Visual Studio, and .Net. The zero day and public disclosure are both resolved by the Windows OS update this month.&lt;/p&gt;

&lt;p&gt;Third-party updates from Mozilla, Google (including two recent zero-day exploits) and Adobe leading up to Patch Tuesday will add to the load. If your organization is updating applications like browsers on a weekly basis to keep up with continuous release applications commonly used to target end users, you should be up to date on all but Adobe. If not, you will want to ensure to get these queued up for your patch maintenance.&lt;/p&gt;

&lt;h2&gt;Microsoft exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Web Distributed Authoring and Versioning (WEBDAV) (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053" rel="noopener" target="_blank"&gt;CVE-2025–33053&lt;/a&gt;) which Microsoft has confirmed to be exploited in the wild. Microsoft rates the CVE as Important and it has a CVSS v3.1 score of 8.8. Risk-based prioritization would treat this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB Client (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073" rel="noopener" target="_blank"&gt;CVE-2025–33073&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important and it has a CVSS v3.1 score of 8.8. The code maturity is Proof-of-Concept and the vulnerability is remotely exploitable, which will make this a desirable target for threat actors. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Google Chrome continues their weekly security update cadence. Expect a Chrome update this week to add to the four releases and 14 CVEs resolved since May Patch Tuesday. This includes two zero-day exploits resolved in the past few weeks (CVE-2025–5419 and CVE-2025–4664).&lt;/p&gt;

&lt;p&gt;Mozilla has released multiple security updates since the Pwn2Own Berlin event. The two CVEs exploited in the event were resolved in the May 17 release (Firefox 138.0.4) and since then, Mozilla has released Firefox 139 and 139.0.4, as well as updates for Firefox ESR and Thunderbird. Ensure you have the latest Mozilla updates queued up this Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Adobe has released updates for Acrobat Reader and six other products, resolving 259 CVEs. 225 of these were included in the Experience Manager update, with hefty contributions from a handful of diligent security researchers.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released one update for June Patch Tuesday resolving a total of three CVEs. The affected product is Ivanti Workspace Control.&lt;/p&gt;

&lt;p&gt;For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/june-security-update"&gt;June Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;June update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is the top priority this month with one zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053" rel="noopener" target="_blank"&gt;CVE-2025–33053&lt;/a&gt;) and one public disclosure (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073" rel="noopener" target="_blank"&gt;CVE-2025–33073&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Google Chrome should be a top priority if you have not deployed updates for June 2 and earlier, as it will resolve two zero-day exploits (CVE-2025–5419 and CVE-2025–4664).&lt;/li&gt;
	&lt;li&gt;Browsers in general should be updated weekly to keep up with the continuous release cycle. Edge, Chrome and Firefox received multiple updates since May Patch Tuesday, including multiple high-profile disclosures and zero-day exploits.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 10 Jun 2025 20:52:28 Z</pubDate></item><item><guid isPermaLink="false">34200be4-39ae-48b7-bc0f-9ef5f2e9cb32</guid><link>https://www.ivanti.com/blog/patch-tuesday-may-2025</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>May 2025 Patch Tuesday</title><description>&lt;p&gt;May Patch Tuesday resolves five actively exploited and two publicly disclosed vulnerabilities. Spoiler alert: all five zero-days are resolved by deploying the Windows OS update. Also, this month Windows 11 and Server 2025 updates include some new AI features, but they carry a lot of baggage. Literally – they are around 4GB! New AI features include Recall, Click to Do and Improved Windows Search.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a total of 72 new CVEs this month, six of which are rated Critical. The five zero-day vulnerabilities are rated Important, but using a risk-adjusted scoring model they would all be rated Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver for WinSock (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709" target="_blank" rel="noopener"&gt;CVE-2025-32709&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain administrator privileges. The vulnerability affects Windows Server 2012 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a pair of Elevation of Privilege vulnerabilities in Windows’ Common Log File System Drive (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706" target="_blank" rel="noopener"&gt;CVE-2025-32706&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701" target="_blank" rel="noopener"&gt;CVE-2025-32701&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerabilities affect all Windows OS versions. The vulnerabilities are confirmed to be exploited in the wild. Microsoft’s severity rating for both CVEs is Important and CVSS 3.1 of 7.8. Risk-based prioritization warrants treating these vulnerabilities as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Microsoft DWM Core Library (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400" target="_blank" rel="noopener"&gt;CVE-2025-30400&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerability affects Windows 10, Server 2016 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a Memory Corruption vulnerability in Microsoft Scripting Engine (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397" target="_blank" rel="noopener"&gt;CVE-2025-30397&lt;/a&gt;) that could allow an unauthorized attacker to execute code over a network. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Remote Code Execution vulnerability in Visual Studio (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702" target="_blank" rel="noopener"&gt;CVE-2025-30397&lt;/a&gt;) that could allow an unauthorized attacker to execute code locally. The vulnerability affects Visual Studio 2019 and 2022. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Identity Spoofing vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685" target="_blank" rel="noopener"&gt;CVE-2025-26685&lt;/a&gt;) that could allow an unauthorized attacker to perform spoofing over an adjacent network. The vulnerability affects Microsoft Defender for Identity. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe has released 13 updates this month resolving 39 CVEs, 33 of which are Critical. For more details, see &lt;a href="https://helpx.adobe.com/security.html" target="_blank" rel="noopener"&gt;Adobe’s Latest Product Security Updates&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release a weekly update shortly, so keep an eye out.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released four updates for May Patch Tuesday resolving a total of four CVEs and one CWE. The affected products include Ivanti Neurons for ITSM (on-prem only), Ivanti ICS, Ivanti Neurons for MDM and Ivanti EPMM.&lt;/p&gt;

&lt;p&gt;The Ivanti EPMM update resolves a medium and a high CVE that when chained together, successful exploitation could lead to unauthenticated remote code execution. Ivanti is aware of a very limited number of customers whose solution has been exploited at the time of disclosure.&lt;/p&gt;

&lt;p&gt;For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/may-2025-security-update"&gt;May Security Update on the Ivanti blog&lt;/a&gt; and &lt;a href="https://www.ivanti.com/blog/epmm-security-update"&gt;EPMM Security Updated&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;May update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Windows OS is your top priority this month with five zero-day exploits reported (CVEs).&lt;/li&gt;
	&lt;li&gt;Ivanti EPMM customers should apply either of the mitigation options or update as soon as possible.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 May 2025 22:03:04 Z</pubDate></item><item><guid isPermaLink="false">9933c7b4-38db-4e37-9af3-cdce170e5851</guid><link>https://www.ivanti.com/blog/april-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>April 2025 Patch Tuesday</title><description>&lt;p&gt;April Patch Tuesday appears to be a high count of resolved CVEs, but a low number of high priority risks. Microsoft has resolved 121 new unique CVEs this month, 11 of which are rated critical and one known to be exploited. The zero-day vulnerability is in the Windows OS this month, making that your top priority.&lt;/p&gt;

&lt;p&gt;In addition, Adobe has released 12 updates resolving 54 CVEs. Adobe ColdFusion was rated highest (Priority 1) and resolves 15 CVEs. Adobe Commerce and Experience Manager Forms were rated Priority 2 and resolved five CVEs and two CVEs respectively. The rest of the Adobe lineup was Priority 3.&lt;/p&gt;

&lt;p&gt;Update your browsers! Google Chrome updated this Patch Tuesday resolving two additional CVEs. On April 1, both Mozilla Firefox and Google Chrome updated. Mozilla Firefox resolved eight CVEs, and Chrome resolved thirteen CVEs. Microsoft Edge (Chromium) updated on April 3 in response to the April 1 Chrome update, which means we will have an additional Edge update coming later this week.&lt;/p&gt;

&lt;p&gt;Oracle is due to release their quarterly CPU on April 15, so keep an eye out for Oracle updates including Java, which will kick off the domino effect of alternative Java frameworks getting updates through the end of April and into early May.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824" target="_blank" rel="noopener"&gt;CVE-2025-29824&lt;/a&gt;) that could allow an attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released updates for most of the Creative Suite including After Effects, Animate, Bridge, Illustrator, Media Encoder, Photoshop and Premiere Pro.&lt;/li&gt;
	&lt;li&gt;Google Chrome released an update resolving two CVEs. Expect Edge to be released later this week.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/#CriticalPatchUpdates" target="_blank" rel="noopener"&gt;Oracle’s quarterly CPU is scheduled for April 15, 2025&lt;/a&gt;. Expect updates for a number of Oracle products, but this release will also kick off the domino effect on all Java frameworks like RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and others.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released one update for April Patch Tuesday resolving a total of six CVEs. The affected products include Ivanti EPM 2022 and EPM 2024. For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/april-security-update"&gt;April Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;April update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is your top priority this month, with the only zero-day exploit reported (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824" target="_blank" rel="noopener"&gt;CVE-2025-29824&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Update all of your browsers! Last week Mozilla, Chrome and Edge received updates, and an additional Chrome update was released on Patch Tuesday. If you have not already, you should consider moving browser updates to a weekly cadence to reduce exposure time, as Chrome and Edge will receive weekly updates, and Firefox typically has two to three updates per month.&lt;/li&gt;
	&lt;li&gt;Expect Oracle updates on April 15 and additional updates for Java frameworks over the next few weeks.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Apr 2025 21:19:58 Z</pubDate></item><item><guid isPermaLink="false">63dbc7eb-03a8-4a08-92c7-8977b81ba969</guid><link>https://www.ivanti.com/blog/march-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>March 2025 Patch Tuesday</title><description>&lt;p&gt;Here in the Midwest US, we have a saying about March, “In like a lion, out like a lamb.” This is in reference to the month starting with strong winter weather and letting off as the month progresses. In fact, we just had a blizzard that dropped 9-12 inches of snow across most of the region overnight, but a week later I see grass and sunny skies and have shed the winter coat!&lt;/p&gt;

&lt;p&gt;At first glance, March Patch Tuesday looks like a lamb, but this lamb might have the teeth of a lion. The standard lineup of updates resolves 57 CVEs across the Windows OS, Office, .Net and Visual Studio, with a couple of Azure component updates in the mix. Google Chrome updated in the lead up to Patch Tuesday (March 10 update), and Adobe released seven updates, including Adobe Acrobat and Acrobat Reader.&lt;/p&gt;

&lt;p&gt;Now let’s talk teeth. There are seven known exploited CVEs for the March lineup.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft resolved six known exploited CVEs. The zero-day exploits affect the Microsoft Management Console, NTFS, Fast FAT, and the Win32 Kernel Subsystem. All six exploits are rated Important with CVSS scores ranging from 4.6 to 7.8. The good news is all six are resolved by the March Windows OS update, so the majority of the immediate risk is resolved by that one update.&lt;/li&gt;
	&lt;li&gt;Google resolved one known exploited CVE (&lt;a href="https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html" target="_blank" rel="noopener"&gt;CVE-2025-24201&lt;/a&gt;), which according to the release notes from Google is an out of bounds write-in GPU on Mac reported by the Apple Security Engineering and Architecture (SEAR) team – so likely only a concern for Mac users. (Based on Microsoft’s release notes, it looks like Edge has not resolved the five CVEs in the March 10 release.)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Management Console (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633" rel="noopener" target="_blank"&gt;CVE-2025-26633&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.0. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. An attacker would need to take additional actions to prepare the target environment for exploitation, but the vulnerability allows for a variety of user-targeted tactics to exploit, including instant message, email and web-based attacks scenarios. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24993" rel="noopener" target="_blank"&gt;CVE-2025-24993&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure vulnerability in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24991" rel="noopener" target="_blank"&gt;CVE-2025-24991&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 5.5. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Windows Fast FAT File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24985" rel="noopener" target="_blank"&gt;CVE-2025-24985&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24984" rel="noopener" target="_blank"&gt;CVE-2025-24984&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 4.6. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Win32 Kernel Subsystem (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983" rel="noopener" target="_blank"&gt;CVE-2025-24983&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.0. The vulnerability affects older Windows editions including Windows 10 and Server 2008 to Server 2016. Microsoft has confirmed that this CVE is exploited in the wild. If exploited, the attacker could gain SYSTEM-level privileges. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Microsoft Access (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26630" rel="noopener" target="_blank"&gt;CVE-2025-26630&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects Microsoft Access 2016, Office 2019, Office LTSC 2021 and 2024, and Microsoft 365 Apps for Enterprise. Microsoft has confirmed that this CVE has been publicly disclosed, but the code maturity is set to be unproven. The disclosure could provide attackers with some additional information to formulate an exploit, but the lack of code samples will increase their efforts. Risk-based prioritization would indicate a slightly higher risk for a disclosure without functional code, but not enough to bump this CVE up to Critical.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities &lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Google Chrome released updates on March 10 resolving five CVEs, including one known exploited CVE (&lt;a href="https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html" rel="noopener" target="_blank"&gt;CVE-2025-24201&lt;/a&gt;). The exploit is documented as an out of bounds write-in GPU on Mac. The priority is higher for macOS than Windows for this update.&lt;/li&gt;
	&lt;li&gt;Adobe released seven updates resolving 37 CVEs. The updates affect Adobe Acrobat and Reader, Illustrator, InDesign, Substance 3D Sampler, Painter, Modeler and Designer. All seven updates are rated priority three and can be handled in the course of your monthly update activities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released two updates for the March Patch Tuesday resolving a total of two CVEs. The affected products are Ivanti Secure Access Client (ISAC) and Ivanti Neurons for MDM (N-MDM). For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/march-security-update"&gt;March Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;March update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS update is the top priority update this month resolving six known exploited CVEs.&lt;/li&gt;
	&lt;li&gt;The March 10 Google Chrome update resolves one known exploited vulnerability on macOS, making the macOS Chrome update a priority.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Mar 2025 21:27:51 Z</pubDate></item><item><guid isPermaLink="false">e53e52e2-cdc6-4819-8a27-1e9fa5f4f45d</guid><link>https://www.ivanti.com/blog/february-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>February 2025 Patch Tuesday</title><description>&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="ojvY_mN7CMc"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;February Patch Tuesday is ramping up with releases from Adobe and Microsoft and an expected release from Google. Adobe resolved 45 CVEs across seven updates. The largest and highest priority is Adobe Commerce, which resolves 30 CVEs. Microsoft is coming down off a huge January release and only resolved 56 new CVEs this February. There are two new zero-day exploits and a revised Secure Boot zero-day in the mix, making the Windows OS a top priority this month.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver for WinSock (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418" rel="noopener" target="_blank"&gt;CVE-2025-21418&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. An attacker who exploited this vulnerability could gain SYSTEM privileges. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Storage (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391" rel="noopener" target="_blank"&gt;CVE-2025-21391&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.1. The vulnerability affects Windows 10 to 11 and Server 2016 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has revised the previously resolved Security Feature Bypass in Secure Boot (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" rel="noopener" target="_blank"&gt;CVE-2023-24932&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.7. The vulnerability was updated to include Windows 11 24H2 and Server 2025 as they are also affected by this known exploited and publicly exploited vulnerability. Additionally, Microsoft has released a more comprehensive update to all affected versions to fully protect against this vulnerability. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Spoofing Vulnerability in NTLM Hash Disclosure (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21377" rel="noopener" target="_blank"&gt;CVE-2025-21377&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.5. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is publicly disclosed. The temporal metrics indicate Exploit Code Maturity is Functional, further increasing the risk of exploitation. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Surface (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21194" rel="noopener" target="_blank"&gt;CVE-2025-21194&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.1. The vulnerability affects Microsoft Surface and Surface Dev Kit systems. Microsoft has confirmed that this vulnerability is publicly disclosed, but the code maturity is unproven.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Adobe released updates for InDesign, Commerce, Substance 3D Stager, InCopy, Illustrator, Substance 3D Designer and Photoshop Elements, resolving a total of 45 CVEs. Six of the updates are Priority 3. Adobe Commerce is set to Priority 1. The Commerce update resolves 30 of the 45 total CVEs Adobe resolved this month and warrants more immediate attention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google Chrome is expected to update later today, which will trigger updates for Chromium-based browsers including Microsoft Edge, so be on the lookout for Chrome and Edge updates as we proceed through the week.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released five product updates resolving 11 CVEs, four of which are Critical. The affected products include Ivanti Cloud Service Application, Ivanti Neurons for MDM, Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Secure Access Client. At the time of release, Ivanti is not aware of any exploitation or public discloses for the 11 resolved CVEs. For more information, &lt;a href="https://www.ivanti.com/blog/february-security-update"&gt;see the February Security Advisory page.&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;February update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft Windows is the top priority this month, with three known exploited CVEs, two publicly disclosed vulnerabilities resolved and two Critical CVEs.&lt;/li&gt;
	&lt;li&gt;Browsers are a prime target for attackers to target users. While including browsers in your monthly update process is recommended, it leaves a lot of CVEs exposed in between cycles. It’s recommended to move browsers to a weekly Priority Updates cadence. Mozilla Firefox releases two to three times a month. Google Chrome has been releasing security updates weekly since &lt;a href="https://security.googleblog.com/2023/08/an-update-on-chrome-security-updates.html" rel="noopener" target="_blank"&gt;August 2023&lt;/a&gt;. The Chromium-based Microsoft Edge has also been releasing weekly. Updating all browsers on a weekly basis is recommended to keep up with the steady stream of security fixes.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Feb 2025 22:45:40 Z</pubDate></item><item><guid isPermaLink="false">685583a1-a416-485a-a172-a083f2e8bf48</guid><link>https://www.ivanti.com/blog/january-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>January 2025 Patch Tuesday</title><description>&lt;p&gt;Microsoft has released updates resolving 159 unique CVEs for January. Among the lineup are three zero-day exploits and five publicly disclosed vulnerabilities. The exploited CVEs are all targeting Windows Hyper-V NT Kernel Integration VSP, making the OS update this month your most urgent priority. The public disclosures impact Windows Themes, Windows App Package Installer and three CVEs for Microsoft Access. There are 10 CVEs rated Critical affecting the components of the Windows OS and Microsoft Excel.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved three Elevation of Privilege vulnerabilities in Windows Hyper-V NT Kernel Integration VSP (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333" target="_blank" rel="noopener"&gt;CVE-2025-21333&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334" target="_blank" rel="noopener"&gt;CVE-2025-21334&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335" target="_blank" rel="noopener"&gt;CVE-2025-21335&lt;/a&gt;). All three vulnerabilities are rated Important and each has a CVSSv3.1 score of 7.8. These vulnerabilities affect Microsoft Windows versions 10, 11 and Server 2025. Microsoft is aware of exploitation of these vulnerabilities. Risk-based prioritization warrants treating these vulnerabilities as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Spoofing Vulnerability in Windows Themes (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308" rel="noopener" target="_blank"&gt;CVE-2025-21308&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.5. The vulnerability affects Windows 10 and 11 as well as Server 2012 up to Server 2025. The CVE has been publicly disclosed, increasing the risk of exploitation. There are mitigations that could reduce the risk of this vulnerability or future security risks. For more details, refer to the Mitigations section of the CVE page.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows App Package Installer (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275" rel="noopener" target="_blank"&gt;CVE-2025-21275&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects Microsoft Windows versions 10, 11, and Server 2025. If exploited, an attacker could gain SYSTEM level privileges. The CVE has been publicly disclosed, increasing the risk of exploitation.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved three Remote Code Execution vulnerabilities in Microsoft Access (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186" rel="noopener" target="_blank"&gt;CVE-2025-21186&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395" rel="noopener" target="_blank"&gt;CVE-2025-21395&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366" rel="noopener" target="_blank"&gt;CVE-2025-21366&lt;/a&gt;). All three vulnerabilities are rated Important and each has a CVSSv3.1 score of 7.8. The vulnerabilities affect Microsoft Office 2019, Access 2016, Office LTSC 2021 and 2024 and Microsoft 365 Apps. The CVEs have been publicly disclosed, increasing the risk of exploitation.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&lt;/h3&gt;

&lt;p&gt;Oracle’s Quarterly CPU is scheduled to release on January 21, so be prepared for updates for Oracle solutions, including Java. Once the Java release is out, expect all of the Java-based frameworks to update over the next few weeks.&lt;/p&gt;

&lt;p&gt;Adobe has released updates for Photoshop, Substance 3D Stager, Illustrator on iPad, Animate and Substance 3D Designer, resolving a total of 14 CVEs. All of the CVEs resolved are rated as Critical, but no exploitation or disclosures have been reported.&lt;/p&gt;

&lt;p&gt;Expect Google Chrome’s weekly security update today or tomorrow along with an update for Microsoft Edge shortly after.&lt;/p&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released three product updates resolving 20 CVEs. The affected products include Ivanti Avalanche, Ivanti Application Control Engine and Ivanti Endpoint Manager. Ivanti is not aware of any exploitation or public disclosures for the 20 resolved CVEs. For more information, see the &lt;a href="https://www.ivanti.com/blog/january-security-update"&gt;January Patch Tuesday Security Advisory page&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;January update priorities:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft Windows is the top priority this month, with three known exploited CVEs, two publicly disclosed vulnerabilities resolved and eight Critical CVEs.&lt;/li&gt;
	&lt;li&gt;Microsoft Office is next in priority from a risk-based perspective. The update this month resolved three publicly disclosed CVEs in Access and two Critical CVEs in Excel. The two Excel CVEs could use the Preview Pane as an attack vector, making them ideal targets for threat actors.&lt;/li&gt;
	&lt;li&gt;Ensure your browsers are all up to date. Mozilla released last week and Google Chrome and Microsoft Edge update weekly with security fixes.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Jan 2025 23:35:11 Z</pubDate></item></channel></rss>