<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Patch Tuesday</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/topics/patch-tuesday/rss" /><link>https://www.ivanti.com/blog/topics/patch-tuesday</link><item><guid isPermaLink="false">1c8ff1fb-4b1f-4f6d-93a5-1e1eb9619ac2</guid><link>https://www.ivanti.com/blog/april-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>April 2026 Patch Tuesday</title><description>&lt;p&gt;The lead up to Patch Tuesday has been interesting. We had a Google Chrome zero-day (CVE-2026-5281) that was patched on April 1, an Adobe Acrobat Reader zero-day (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) late in the day on Friday April 10, and several older CVEs that were added to the CISA KEV list yesterday (&lt;a href="https://www.cisa.gov/news-events/alerts/2026/04/13/cisa-adds-seven-known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;April 13&lt;/a&gt;). All of this amidst a lot of industry buzz about Anthropic Mythos and &lt;a href="https://www.anthropic.com/glasswing" rel="noopener" target="_blank"&gt;Project Glasswing&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;What is the correlation between these events and Project Glasswing you ask? Most of the discussions around Mythos have been focused on where it will be used and the ramifications.&lt;/p&gt;

&lt;p&gt;Finding exploitable flaws in code can be a powerful tool for good when used by the vendor writing the code before it is released. However, it will also be used by researchers and threat actors to find flaws in code that is already released and that is where my speculation is directed.&lt;/p&gt;

&lt;p&gt;Consider the knock-on effects of a massive model like Mythos and what it will mean near term and longer term for the software that companies consume. Near term you will have the big players using a solution like this to release more secure code. As researchers and threat actors adopt more robust AI models to identify exploitable flaws this will result in more coordinated disclosures (good), zero-day exploits (bad) and n-day exploits (bad). All of this will result in more frequent, and more importantly, urgent software updates.&lt;/p&gt;

&lt;p&gt;Many organizations currently struggle to keep up with priority updates resolving exploited vulnerabilities when they occur outside of their normal monthly maintenance. I suspect most organizations were not aware of the Adobe Acrobat zero-day exploit until the CISA KEV update yesterday. This means that threat actors had another 2-3 days of free reign to exploit CVE-2026-34621 before most organizations became aware and many of those organizations will likely handle the update as part of their regular maintenance that is starting today on Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Browser security updates are a weekly occurrence. Many other applications that users are utilizing regularly release updates on a continuous cadence, not a set monthly release date. This means many of the user targeted exploits are going to occur in software that is releasing outside of the average organizations maintenance schedules and that frequency is about to increase. It is hard to say if that increase is going to be 1.5x or 5x, but rest assured that the increase will be noticeable and will exacerbate a challenge that most organizations already struggle with – timely patch management.&lt;/p&gt;

&lt;p&gt;Enter Exposure Management. This is really a mindset and maturity change as much as a technology evolution. The mindset change requires us to consider a world where we need to make the decisions up front and monitor those decisions. This is called defining your Risk Appetite and monitoring your Risk Posture. Doing this effectively matures an organizations’ response to risks and makes remediation activities much more clear cut.&lt;/p&gt;

&lt;p&gt;The technology evolution requires the traditional vulnerability assessment technologies to integrate into a broader ecosystem where asset visibility or system of record comes together with vulnerability assessment and vulnerability intelligence solutions to refine when risks require more immediate action vs waiting for your regular maintenance activities to occur. Most important is the need for this tech stack to be integrated with your AEM (Autonomous Endpoint Management) platform as this is where remediation predominantly (and automatically) occurs.&lt;/p&gt;

&lt;p&gt;Now, back to our regularly scheduled Patch Tuesday update. Microsoft has resolved 169 CVEs this month which is a massive patch Tuesday lineup. April Patch Tuesday is the second-largest Patch Tuesday on record behind the October 2025 Patch Tuesday which resolved 175 CVEs. The lineup includes one zero-day exploit (CVE-2026-3220) and one public disclosure (CVE-2026-33825) and breaks down into 8 Critical, 156 Important, 3 Moderate and 1 Low severity.&lt;/p&gt;

&lt;p&gt;The zero-day CVE is in Microsoft SharePoint and the public disclosure is in Microsoft Defender making those two updates the most urgent for this month in addition to the Adobe Acrobat and Google Chrome updates leading up to Patch Tuesday.&lt;/p&gt;

&lt;h2&gt;Microsoft’s known exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Server Spoofing Vulnerability in Microsoft SharePoint (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 6.5, but it has been confirmed to be exploited in the wild. An attacker who successfully exploits this vulnerability can view sensitive information and make changes to the disclosed information. The vulnerability affects SharePoint server Subscription Edition, SharePoint Server 2019 and SharePoint Server 2016. A risk-based prioritization methodology warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege Vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825" rel="noopener" target="_blank"&gt;CVE-2026-33825&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but has been publicly disclosed. The CVE lists exploit code maturity as Proof-of-Concept which puts this at a higher risk of exploitation. An attacker could use this vulnerability to allow an authorized attacker to elevate their privileges to SYSTEM on the local machine.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for April. The update affects Ivanti Neurons for ITSM and resolves two CVEs. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/april-2026-security-update"&gt;April Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released twelve updates this month, eleven of which released on Patch Tuesday and the zero-day update for Acrobat that released on Friday, April 10. 54 CVEs were resolved with a breakdown of 39 Critical, 13 Important and 2 Moderate. APSB26-43 resolved the zero-day exploit (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;).&lt;/p&gt;

&lt;h2&gt;April update to-do list&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe Acrobat (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener" target="_blank"&gt;CVE-2026-34621&lt;/a&gt;) and Google Chrome (CVE-2026-5281) each had zero-day exploits leading up to Patch Tuesday. Ensure that you are prioritizing remediation of these two products to the latest version.&lt;/li&gt;
	&lt;li&gt;Microsoft SharePoint includes a zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201" rel="noopener" target="_blank"&gt;CVE-2026-32201&lt;/a&gt;) and should be investigated as a priority especially if you have known update challenges with your SharePoint environments.&lt;/li&gt;
	&lt;li&gt;The Microsoft Windows OS update this month resolves 133 CVEs (depending on edition) and includes 4 Critical CVEs. This update will resolve a significant number of findings across your environment.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Apr 2026 22:51:36 Z</pubDate></item><item><guid isPermaLink="false">4438f929-aa59-4aee-a8d8-d16555dab909</guid><link>https://www.ivanti.com/blog/march-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>March 2026 Patch Tuesday</title><description>&lt;p&gt;March Patch Tuesday resolves 79 CVEs, of which three are Critical and 76 are Important. There are two publicly disclosed CVEs this month, but none exploited. Microsoft has also released an Edge update resolving nine Chrome CVEs. The public disclosures include a Denial-of-Service vulnerability in .Net and an Elevation of Privilege vulnerability in SQL Server. Both disclosures are listed as Unproven for Exploit Code Maturity indicating the disclosures did not include any code samples.&lt;/p&gt;

&lt;p&gt;Adobe and Mozilla have released updates as part of the March Patch Tuesday including eight updates from Adobe resolving a total of 80 CVEs, 21 of which are rated Critical. Mozilla Firefox 148.0.2 released resolving three high severity CVEs.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerability&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in SQL Server (CVE-2026-21262). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker who successfully exploited this vulnerability could gain SAL sysadmin privileges. The vulnerability affects SQL Server 2016 and later editions.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Denial of Service vulnerability in .NET (CVE-2026-26127). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.5, but&amp;nbsp;it&amp;nbsp;has been publicly disclosed. An attacker could cause an out-of-bounds read in .NET allowing an unauthorized attacker to deny service over a network. The vulnerability affects .NET 9 and 10 on Windows, Mac OS and Linux as well as NuGet 9 and 10 packages.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released eight updates this month resolving a total of 80 CVEs, 21 of which are rated Critical. Adobe Commerce is the highest priority this month with a Priority 2 rating. Other affected products include Adobe Illustrator, Substance 3D Painter, Acrobat and Acrobat Reader, Premier Pro, Experience Manager, Substance 3D Stager, and DNG SDK.&lt;/p&gt;

&lt;p&gt;Mozilla has released an update for Firefox 148.0.2 resolving three High severity vulnerabilities.&lt;/p&gt;

&lt;h2&gt;March update to-do list&lt;/h2&gt;

&lt;p&gt;The Microsoft OS and Office updates will resolve the majority of the CVEs resolved this month in two easy updates.&lt;/p&gt;

&lt;p&gt;Mozilla Firefox, Microsoft Edge and Google Chrome are all released frequently. Prioritize browser updates on a weekly or daily basis to reduce risks continuously with minimal risk of impact.&lt;/p&gt;
</description><pubDate>Tue, 10 Mar 2026 21:01:35 Z</pubDate></item><item><guid isPermaLink="false">613c7534-d87d-411a-8d02-57955ea3c5e1</guid><link>https://www.ivanti.com/blog/february-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>February 2026 Patch Tuesday</title><description>&lt;p&gt;February Patch Tuesday includes recent out-of-band updates from Microsoft between January 17th and 29th, including multiple bug fixes and a fix for a zero-day exploit in Microsoft Office. In addition, Microsoft announced the phased disablement of NTLM precede the February 2026 Patch Tuesday release.&lt;/p&gt;

&lt;p&gt;For the February Patch Tuesday release, Microsoft has resolved 57 unique CVEs. Six CVEs are flagged as Exploited and three of those are Publicly Disclosed as well. Add the out-of-band (OOB) zero-day and you have a lineup of CVEs that need some attention.&lt;/p&gt;

&lt;h2&gt;January Out-of-Band Releases&lt;/h2&gt;

&lt;p&gt;The first OOB release on January 17th resolved a credential prompt failure when attempting remote desktop or remote appliance connections. The second round of OOB updates occurred on January 24th and 26th resolving application crashes in Outlook and OneDrive, and system hibernation/shut down issues. And finally, the third OOB update on January 26th was a zero-day vulnerability &amp;nbsp;CVE-&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;2026-21509&lt;/a&gt;, a Microsoft Office Security Feature bypass vulnerability.&lt;/p&gt;

&lt;h2&gt;Microsoft plans phased NTLM disablement&lt;/h2&gt;

&lt;p&gt;Microsoft released their plan for the&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt;&amp;nbsp;of New Technology LAN Manager (NTLM) in the latest operating systems starting now in 2026 and beyond. The NTLM authentication protocol was introduced back in 1993 and has since been superseded by Kerberos protocols, which are far more secure. However, NTLM has remained the fallback when Kerberos is unavailable despite being deprecated and having weak algorithms.&lt;/p&gt;

&lt;p&gt;Phase one introduces additional auditing to help identify where NTLM may still be running and&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-8-%E2%80%93-disabling-ntlm/4485782" rel="noopener" target="_blank"&gt;changing it out&lt;/a&gt;&amp;nbsp;where you can. Starting now, Microsoft recommends using&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/overview-of-ntlm-auditing-enhancements-in-windows-11-version-24h2-and-windows-server-2025-b7ead732-6fc5-46a3-a943-27a4571d9e7b" rel="noopener" target="_blank"&gt;advanced NTLM auditing&lt;/a&gt;&amp;nbsp;already available in Server 2025, and Windows 11 24H2 and newer. Phase two begins with major OS updates coming later this year. This update will address the ‘pain points’ or blockers by removing multiple fallback scenarios where Kerberos reverts back to NTLM.&lt;/p&gt;

&lt;p&gt;And finally in phase three, NTLM will be disabled by default. The code will still be there, but you will need to explicitly re-enable it if absolutely needed. This three-phase approach will happen quickly, so plan appropriately to replace NTLM in your environment and take a giant security step forward. The ‘NTLM disabled by default’ phase will occur with the next major Server update.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;On January 29th, Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Office (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;CVE-2026-21509&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can send a user a malicious Office file and convince them to open the file to exploit the vulnerability. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Remote Desktop Services (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533" rel="noopener" target="_blank"&gt;CVE-2026-21533&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519" rel="noopener" target="_blank"&gt;CVE-2026-21519&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in MSHTML Framework (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513" rel="noopener" target="_blank"&gt;CVE-2026-21513&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Windows Shell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510" rel="noopener" target="_blank"&gt;CVE-2026-21510&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514" rel="noopener" target="_blank"&gt;CVE-2026-21514&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can bypass a security feature locally due to a reliance on untrusted inputs. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Denial of Service vulnerability in Windows Remote Access Connection Manager (CVE-2026-21525). The vulnerability is rated Moderate by Microsoft and has a CVSS v3.1 score of 6.2, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. A null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for February. The update affects Ivanti Endpoint Manager and resolves two new CVEs and 11 medium severity CVEs that were disclosed in late 2025. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/february-2026-security-update"&gt;February Security Advisory&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, there was a security advisory on January 29th for Ivanti Endpoint Manager Mobile (EPMM) that had a limited number of customers impacted at time of disclosure. Ivanti urges all customers using the on-prem EPMM product to promptly install the Security Update. The security advisory, additional technical analysis, and an Exploitation Detection script co-developed with NCSC-NL can be found in the &lt;a href="https://www.ivanti.com/blog/january-2026-epmm-security-update"&gt;January Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates this month resolving 43 CVEs, 27 of which are Critical. All nine updates are rated Priority three by Adobe.&lt;/p&gt;

&lt;h2&gt;February update to-do list&lt;/h2&gt;

&lt;p&gt;Windows OS and Microsoft Office updates are priority this month resolving six new and one OOB zero-day exploits.&lt;/p&gt;

&lt;p&gt;Review Microsoft&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt; of NTLM announcement and documentation to start planning for the deprecation and disablement of NTLM.&lt;/p&gt;
</description><pubDate>Tue, 10 Feb 2026 21:58:44 Z</pubDate></item><item><guid isPermaLink="false">7bbd54ed-d35c-4e94-b814-6920a467a5e7</guid><link>https://www.ivanti.com/blog/january-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>January 2026 Patch Tuesday</title><description>&lt;p&gt;New year,&amp;nbsp;new updates!&amp;nbsp;Welcome back to the Ivanti Patch Tuesday blog where we&amp;nbsp;provide&amp;nbsp;you&amp;nbsp;critical insights to&amp;nbsp;optimize&amp;nbsp;your exposure management activities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This month there are a pair of Mozilla CVEs that are suspected&amp;nbsp;of being&amp;nbsp;exploited and a Microsoft CVE that has been exploited.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, Microsoft has a pair of&amp;nbsp;publicly disclosed vulnerabilities that will need to be reviewed to see if your organization may be&amp;nbsp;impacted&amp;nbsp;by the changes Microsoft is making.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There are&amp;nbsp;additional&amp;nbsp;third-party&amp;nbsp;updates&amp;nbsp;from Adobe,&amp;nbsp;and&amp;nbsp;you should&amp;nbsp;expect more from Google and Oracle over the next few days and into next week&amp;nbsp;that should be included in your monthly maintenance.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A side note of good news:&amp;nbsp;Microsoft has broken the Server 2025&amp;nbsp;update out&amp;nbsp;into a separate KB,&amp;nbsp;so it is only&amp;nbsp;1.9GB in size,&amp;nbsp;versus this month’s&amp;nbsp;4GB+ Windows 11 cumulative update.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an&amp;nbsp;Information Disclosure vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805" rel="noopener" target="_blank"&gt;CVE-2026-20805&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 5.5, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. The exposure could be used to&amp;nbsp;disclose&amp;nbsp;a section address from a remote ALPC port&amp;nbsp;that&amp;nbsp;is user-mode memory. The vulnerability affects all currently supported and extended security update-supported versions of the Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a&amp;nbsp;Security Feature Bypass vulnerability in Secure Boot Certification Expiration&amp;nbsp;(&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265" rel="noopener" target="_blank"&gt;CVE-2026-21265&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of&amp;nbsp;6.4,&amp;nbsp;but&amp;nbsp;it&amp;nbsp;has been publicly&amp;nbsp;disclosed.&amp;nbsp;In&amp;nbsp;addition&amp;nbsp;the update, the&amp;nbsp;fix&amp;nbsp;provides a warning&amp;nbsp;regarding&amp;nbsp;certificates that will be expiring in 2026&amp;nbsp;and details on actions that are&amp;nbsp;required&amp;nbsp;to up&amp;nbsp;renew&amp;nbsp;certificates&amp;nbsp;prior to their&amp;nbsp;expiration.&amp;nbsp;It is recommended to start investigating what actions your organization may need to take to prevent potential serviceability and security as certificates expire.&amp;nbsp;  &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft is addressing&amp;nbsp;an&amp;nbsp;Elevation of Privilege vulnerability in Windows Agere Soft Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-31096" rel="noopener" target="_blank"&gt;CVE-2023-31096&lt;/a&gt;). The vulnerability CVE ID was assigned by MITRE&amp;nbsp;in 2023. It&amp;nbsp;is rated Important and has a CVSS v3.1 score of 7.8.&amp;nbsp;The CVE has been publicly&amp;nbsp;disclosed. Microsoft’s resolution is to remove the affected drivers from the Windows OS as&amp;nbsp;of the January 2026 cumulative update. Microsoft recommends removing any existing dependencies on this hardware.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released no security advisories this month.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/" rel="noopener" target="_blank"&gt;Mozilla has released updates for Firefox and Firefox ESR,&amp;nbsp;resolving a total of&amp;nbsp;34&amp;nbsp;CVEs&lt;/a&gt;. All three updates have an Impact rating of High. Two CVEs are suspected to be exploited (CVE-2026-0891 and CVE-2026-0892). Both are resolved in Firefox 147 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/" rel="noopener" target="_blank"&gt;MFSA2026-01&lt;/a&gt;),&amp;nbsp;and CVE-2026-0891 is resolved in Firefox ESR 140.7 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/" rel="noopener" target="_blank"&gt;MFSA2026-03&lt;/a&gt;).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Expect Google Chrome and Microsoft Edge updates this week in addition to a high-severity vulnerability in Chrome WebView that was resolved in the January 6 Chrome update (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe&amp;nbsp;has released 11 updates this month affecting&amp;nbsp;DreamWeaver, InDesign,&amp;nbsp;Illustrator, InCopy, Bridge, Substance 3D Modeler, Stager, Painter,&amp;nbsp;Sampler&amp;nbsp;and Designer and&amp;nbsp;Coldfusion.&amp;nbsp;Coldfusion&amp;nbsp;is a priority 1. Everything else is priority 3, but most of the updates include Critical CVEs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Oracle’s Quarterly CPU is scheduled to&amp;nbsp;release&amp;nbsp;on January 20, so be prepared for updates for Oracle solutions, including Java. Once the Java release is out,&amp;nbsp;expect&amp;nbsp;all of&amp;nbsp;the Java-based frameworks to update over the next few weeks.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;January update&amp;nbsp;to-do&amp;nbsp;list&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Browser updates are a priority this month. Mozilla resolved two suspected zero-day exploits (CVE-2026-0891 and CVE-2026-0892),&amp;nbsp;and Chrome resolved a high-severity CVE (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The Windows OS update resolves one exploited and two publicly disclosed vulnerabilities this month,&amp;nbsp;putting the Windows OS update as top priority this month&amp;nbsp;alongside&amp;nbsp;the browser updates.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Review Secure Boot Certificate timelines and usage of Agere Soft Modem drivers&amp;nbsp;to avoid serviceability and security issues.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 Jan 2026 21:52:53 Z</pubDate></item><item><guid isPermaLink="false">f6313797-d456-4178-8477-933be69ec3b9</guid><link>https://www.ivanti.com/blog/december-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>December 2025 Patch Tuesday</title><description>&lt;p&gt;Here we are at the final Patch Tuesday for 2025. Microsoft has resolved 56 CVEs (two Critical and 54 Important). Included in this release is one known exploited (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and two publicly disclosed CVEs (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). This month’s OS update resolves the exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and one of the public disclosures (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;), making the Windows OS a top priority this month. The other public disclosure is in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;), which would require developers to download and update the GitHub Copilot plugin.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Third-party updates this Patch Tuesday include multiple releases from Mozilla for Firefox 146 and Firefox ESR 115.31 and 140.6. Adobe released five updates to resolve 142 CVEs including an update for Adobe Acrobat and Reader. Four of five updates are rated as Priority Three, but the Adobe ColdFusion update is rated Priority One. There are no known exploits, but the ColdFusion update resolves the bulk of the CVEs resolved by Adobe this month.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Cloud Files Mini Filter Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but is confirmed to be exploited in the wild. An attacker who successfully exploits this CVE could gain SYSTEM privileges. The CVE affects Windows 10 and later Windows editions. A risk-based prioritization approach would prioritize this CVE as Critical.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in PowerShell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but has been publicly disclosed. The fix provides a warning and guidance to avoid the potential remote code execution, but the nature of the exposure makes it improbable to fully remediate. The Invoke-WebRequest command can parse the contents of a web page and could potentially run script code in the web page when it is parsed. A warning is presented recommending the use of the -UseBasicParsing switch to avoid script code execution. The CVE affects Server 2008 and later Windows editions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.4 but has been publicly disclosed. An attacker could exploit code using a malicious Cross Prompt Inject in untrusted files or MCP servers, allowing the execution of additional commands by appending them to commands allowed in the user’s terminal auto-approve setting.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update this month. The update affects Ivanti Endpoint Manager and resolves four vulnerabilities. More details and information about mitigations can be found in the &lt;a href="https://www.ivanti.com/blog/december-2025-security-update"&gt;December Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Mozilla has released updates for Firefox and Firefox ESR resolving a total of 27 CVEs. All three updates have an Impact rating of High.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Adobe released five updates this month affecting ColdFusion, Experience Manager, DNG SDK, Acrobat and Reader and Creative Cloud Desktop. ColdFusion is a Priority One and resolves the majority of the 142 CVEs. The other four updates are rated Priority Three.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;December update priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The Windows OS update is the priority this month to resolve &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;All other updates can be resolved under normal SLA priorities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 09 Dec 2025 22:05:21 Z</pubDate></item><item><guid isPermaLink="false">7110e1c4-6550-4404-9c43-44e911ea4946</guid><link>https://www.ivanti.com/blog/november-2025-patch-tuesday</link><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>November 2025 Patch Tuesday</title><description>&lt;p&gt;November Patch Tuesday is the first Patch Tuesday after the EoL of Windows 10. In the shadow of Windows 10, there are a number of other product EoLs of note. Exchange Server, for one, is getting some additional attention. &lt;a href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" rel="noopener" target="_blank"&gt;Microsoft announced a 6-month ESU option for Exchange 2016/2019 servers&lt;/a&gt; for customers who need the extension. Their guidance, however, is not to rely on this program and to make every attempt to move off of Exchange and move to Exchange SE in time. Cybersecurity agencies across the globe have also collaborated to provide a &lt;a href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" rel="noopener" target="_blank"&gt;Security Best Practices guide for Microsoft Exchange Server&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Microsoft resolved 63 unique vulnerabilities this month, including one known exploited CVE (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215" rel="noopener" target="_blank"&gt;CVE-2025-62215&lt;/a&gt;). The exploited CVE is an Elevation of Privilege vulnerability in the Windows Kernel that can allow an attacker to gain SYSTEM-level privileges on the target system. Affected products this month include Windows OS, Office, SharePoint, SQL Server, Visual Studio, GitHub Copilot and Azure Monitor Agent.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For third-party updates, Oracle released their quarterly &lt;a href="https://www.oracle.com/security-alerts/cpuoct2025.html" rel="noopener" target="_blank"&gt;Critical Patch Update&lt;/a&gt; on October 21, 2025. This included many updates including Java. With the release of Java comes a stream of Java framework updates, including RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and others.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch Tuesday third-party updates include eight from Adobe and three from Mozilla, and Google Chrome released a stability and performance update this month (no CVEs reported).&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215" rel="noopener" target="_blank"&gt;CVE-2025-62215&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.0. The vulnerability requires an attacker to win a race condition, but if exploited it would allow the attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all currently supported Windows OS editions and Windows 10 ESU, which means the risk of running Windows 10 past the EoL without ESU is not hypothetical. Ensure you are subscribing to Windows 10 ESU and providing additional mitigations where possible.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one Security Advisory for November Patch Tuesday, resolving three CVEs. The security advisory for Ivanti Endpoint Manager provides details on vulnerable versions. Also, the advisory reminds Ivanti Endpoint Manager customers that version 2022 reached End of Life at the end of October 2025. All Ivanti EPM customers are urged to upgrade to 2024 SU4 to remediate the three vulnerabilities.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/november-2025-security-update"&gt;November Security Updat&lt;/a&gt;e on the Ivanti blog.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released eight updates resolving 28 CVEs. All eight updates are rated priority three.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Mozilla released three updates resolving a total of 29 CVEs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Google Chrome just released a stability and performance update, but it has resolved 27 CVEs since October Patch Tuesday.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;November update priorities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is the highest priority this month, with one zero-day exploit.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Continue to monitor your environment for EoL software. Beyond Windows 10 EoL, there are editions of Office that are now EoL along with Exchange. The first month after the Windows 10 EoL has a zero-day that affects the Windows 10 OS. The risks of continuing to run EoL software without extended support are very real, and threat actors will be looking to take advantage.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Nov 2025 20:26:09 Z</pubDate></item><item><guid isPermaLink="false">9e9a6540-2b98-4a64-9124-117518ba31b4</guid><link>https://www.ivanti.com/blog/october-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>October 2025 Patch Tuesday</title><description>&lt;p&gt;October Patch Tuesday is going to be a busy one from all angles. Microsoft exceeded the January CVE count (159 CVEs) by a healthy margin, with 172 CVEs resolved this month. There are three exploited and two publicly disclosed vulnerabilities this month, but fortunately all of them are in the cumulative OS update, making resolution quick and clean. They are also end of life-ing a lot of products, including Windows 10! Additionally, Office 2016 and 2019 and Exchange Server 2016 and 2019 have also reached end of life.&lt;/p&gt;

&lt;p&gt;Adobe released 12 updates resolving 36 CVEs. Mozilla released five updates resolving 45 CVEs and are cautioning users that three of these CVEs are showing signs they may have been exploited in the wild (unconfirmed). And of course, Google Chrome is expected to release their weekly update in the next 24 hours.&lt;/p&gt;

&lt;p&gt;There is a lot to unpack, so let’s get started.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Secure Boot bypass in IGEL OS before 11 vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827" rel="noopener" target="_blank"&gt;CVE-2025-47827&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 4.6. Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature, allowing a crafted root file system to be mounted from an unverified image.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Remote Access Connection Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230" rel="noopener" target="_blank"&gt;CVE-2025-59230&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8. Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990" rel="noopener" target="_blank"&gt;CVE-2025-24990&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8.&amp;nbsp; The driver shipped natively with the Windows OS. Microsoft has removed the driver with the October cumulative update and recommends removing any existing dependencies on this fax modem hardware. Exploit is possible even if the drive is not being used. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052" rel="noopener" target="_blank"&gt;CVE-2024-24052&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 7.8. The exploit code maturity is listed as proof-of-concept, which increases the risk of exploitation. A risk-based prioritization methodology would warrant treating this as Critical.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an out-of-bounds read vulnerability in TCG TPM2.0 reference implementation (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884" rel="noopener" target="_blank"&gt;CVE-2024-2884&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 5.3. The exploit code maturity is listed as unproven, indicating there is currently no publicly available code.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates and one Security Advisory for October Patch Tuesday, resolving a total of seven CVEs. The affected products include Ivanti Neurons for MDM and Ivanti Endpoint Manager Mobile. The Ivanti Neurons for MDM vulnerabilities were resolved for all customers on October 10, 2025. An additional Security Advisory was released for Ivanti Endpoint Manager, which provides mitigation options for vulnerabilities disclosed October 7, 2025.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/october-2025-security-update"&gt;October Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released 12 updates addressing 36 CVEs. Adobe has rated the Commerce update as a priority two and the rest of the updates as priority three.&lt;/li&gt;
	&lt;li&gt;Mozilla released five updates resolving 45 CVEs. Three of the CVEs included variations of the statement, “Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code,” indicating a possibility of exploitation in the wild. All five updates include at least one of the suspected exploit CVEs, we recommend treating all five as containing a known exploited CVE.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release in the next 24 hours, so plan a Chrome update and a possible Edge update shortly after.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;October update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS cumulative update is the top priority this month, as it resolves three exploited and two publicly disclosed CVEs.&lt;/li&gt;
	&lt;li&gt;All Mozilla updates should be deployed during your current maintenance, but any deferral or delay would come with risks as there are three CVEs that are speculated to be exploitable in the wild already.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Oct 2025 21:43:03 Z</pubDate></item><item><guid isPermaLink="false">419bfa61-ee47-4c09-aa89-434ff944ccb0</guid><link>https://www.ivanti.com/blog/september-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>September 2025 Patch Tuesday</title><description>&lt;p&gt;The days leading into September Patch Tuesday include a bit of chaos from a pair of actively exploited Android CVEs (CVE-2025-38352, CVE-2025-48543), a zero day in WhatsApp (CVE-2025-55177), another zero day in WinRAR (CVE-2025-8088), and a major supply chain attack through the Drift AI Chat Agent exposing Salesforce customers data.&lt;/p&gt;

&lt;p&gt;The good news is Microsoft only has a pair of publicly disclosed vulnerabilities (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;) out of 81 total CVEs resolved this month, making this about as close to a calm Patch Tuesday as we can hope for.&lt;/p&gt;

&lt;p&gt;The Windows OS and Office updates are rated Critical this month, putting those as the highest priority, but with no zero-day exploits, this month should be focused on routine maintenance from a Microsoft perspective.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 8.8 and affects all Windows OS editions. The code maturity is unproven, which would indicate no code samples have been disclosed. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Improper Handling of Exceptional Conditions vulnerability in Newtonsoft.Json (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is unrated and affects SQL Server 2016, 2017 and 2019. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial-of-service condition. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates resolving 22 CVEs, 12 of which are rated Critical. The products affected include Adobe Acrobat Reader, After Effects, Premiere Pro, Commerce, Substance 3D Viewer, Experience Manager, Dreamweaver, 3D Substance Modeler and ColdFusion. Adobe has rated the ColdFusion update as a priority one and Commerce as a priority two. The other seven updates are rated priority three.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates for September Patch Tuesday resolving a total of 13 CVEs. The affected products include Ivanti Connect Secure and Policy Secure and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/september-2025-security-update"&gt;September Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;September update priorities&lt;/h2&gt;

&lt;p&gt;With no zero-days released on Patch Tuesday, the updates this month are predominantly low risk. Ensure you have the zero days leading up to Patch Tuesday in hand, and plan to deploy the Microsoft and Adobe updates through your regular maintenance activities this month.&lt;/p&gt;
</description><pubDate>Tue, 09 Sep 2025 21:28:36 Z</pubDate></item><item><guid isPermaLink="false">3ae8d951-7002-41fd-976c-737c26267f79</guid><link>https://www.ivanti.com/blog/august-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>August 2025 Patch Tuesday</title><description>&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="cLNedMpRCyk"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;Let me start this month off with a question. Have you already decided what you are going to do for your remediation plan this month? Think about it for a second. OS updates, productivity apps, browsers, and other apps are already likely under consideration for your August patch maintenance. The real decisions you need to consider are around timing. Do you proceed with your typical Patch Tuesday plan or do you need to accelerate any zero-days, etc?&lt;/p&gt;

&lt;p&gt;What you just thought about was a generalization of defining your risk appetite. There is a lot of discussion across the vulnerability management market about how to modernize vulnerability management. When you think about trends like 32% of 1H 2025 known exploited vulnerabilities (KEVs) being zero-day or 1-day exploits it can feel overwhelming. How do you keep up with a continuous stream of updates? Ideally by defining your outcome and configuring for success.&lt;/p&gt;

&lt;p&gt;If we break this month’s Patch Tuesday down into parallel remediation streams:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Routine Maintenance: Much of what just released today will fall into your reoccurring monthly maintenance which typically starts on Patch Tuesday and runs for two weeks or more depending on your SLAs, OS, productivity apps, third-party apps, etc.&lt;/li&gt;
	&lt;li&gt;Priority updates: Browsers tend to release more frequently (typically weekly) and may warrant a priority update track to keep up with the constant stream of new exposures in your environment. This patch cycle you may be resolving CVEs in multiple browsers from the past four weeks if you don’t have a more frequent update plan in place for the browsers.&lt;/li&gt;
	&lt;li&gt;Zero-day Response: The recent SharePoint exploits are a good example of the disruptive\unpredictable nature of zero-day exploits.&lt;/li&gt;
	&lt;li&gt;Continuous Compliance: The three previous tracks could solve most of your remediation challenges, but what about users who are on vacation, leave of absence, got a new system and shipping bypassed the current month’s maintenance window or installed something new that was not the latest version? Defining a baseline and keeping that updated as new updates pass your quality tests would keep your systems in compliance when the multitude of reasons for drift occur.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft resolved one publicly disclosed vulnerability in Windows Kerberos (CVE-2025-53779). The CVE is an Elevation of Privilege vulnerability that could allow an attacker to gain domain admin privileges. The CVE is rated Medium and has a CVSS score of 7.2. The vulnerability only affects Windows Server 2025.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released thirteen new updates on Patch Tuesday, but the most urgent is the Adobe Experience Manager Forms update released on August 5 resolving two publicly disclosed CVEs (CVE-2025-54253 and CVE-2025-54254). &lt;a href="https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html" rel="noopener" target="_blank"&gt;APSB25-82&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Google Chrome 139.0.7258 released resolving five CVEs and is rated Critical. This will also affect Microsoft Edge so watch for that update to come likely later this week.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;August update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft SharePoint is the top priority this month to resolve recent zero-day exploits being targeted by multiple nation state level threat actors. Update ASAP.&lt;/li&gt;
	&lt;li&gt;Adobe Experience Manager Forms update released on August 5 is your second highest priority.&lt;/li&gt;
	&lt;li&gt;Windows OS and Office have Critical CVEs this month. Get them updated as part of your regular maintenance and you should be good.&lt;/li&gt;
	&lt;li&gt;Microsoft Exchange Server and SQL Server each received updates. The CVEs were only rated as Important so no need to escalate remediation, but server admins should start to test and rollout within the next month.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 12 Aug 2025 22:08:03 Z</pubDate></item><item><guid isPermaLink="false">d95dc7b1-8024-40d9-915e-a4549e38b7fa</guid><link>https://www.ivanti.com/blog/july-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>July 2025 Patch Tuesday</title><description>&lt;p&gt;July Patch Tuesday is a sizable one, but no significant security risk. Microsoft resolved 130 new CVEs, including one public disclosure. There are seven additional CVEs from MITRE regarding vulnerabilities in Git resolved through the Visual Studio update this month. Fourteen CVEs are rated Critical by Microsoft, affecting Windows OS, Office, SharePoint, and SQL.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The DHCP issue caused by the June 2025 update appears to be resolved. It is not reported as a known issue for Windows OS KBs, and some quick querying through Gemini agrees the issue appears to be resolved.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Gemini’s response to the query is below:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;July update server DHCP issue resolved&lt;/p&gt;

&lt;p&gt;Yes, according to information available on July 8, 2025, Microsoft has resolved the DHCP server issue that was caused by the June 2025 security updates.&lt;/p&gt;

&lt;p&gt;Key points:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;June 2025 updates caused the problem: Microsoft's June 2025 Patch Tuesday updates introduced a bug that could cause the DHCP service to freeze or stop responding on Windows Server 2016 through 2025. This issue prevented some clients from renewing their IP addresses.&lt;/li&gt;
	&lt;li&gt;Fix released in July updates: Microsoft released Windows updates on July 8, 2025, and subsequent updates that resolve this issue.&lt;/li&gt;
	&lt;li&gt;Workaround before the fix: Before the July updates were available, the recommended workaround was to uninstall the affected June updates and restart the server, but this left systems vulnerable to security threats patched in those updates.&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;p&gt;The Windows Server OS updates this month resolve 16 CVEs in Windows Routing and Remote Access Service (RRAS). These vulnerabilities could allow an unauthenticated attacker to convince a user to initiate a connection to a malicious server that could allow them to execute arbitrary code. The attack would require no privileges and could be exploited over the network. Applying the updates to the OS is the best solution, but additional mitigations like restricting RRAS ports to trusted networks or VPN concentrators can limit exposure, as well as employing firewall rules and disabling unused RRAS features.&lt;/p&gt;

&lt;p&gt;Developers have a bit of work to do on their side this month. Microsoft resolved seven CVEs in Git and two additional CVEs that require a Visual studio update this month.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure in Microsoft SQL (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49719" rel="noopener" target="_blank"&gt;CVE-2025-49719&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 7.5. The code maturity is unproven, which would indicate no code samples. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Google Chrome resolved their fourth zero-day exploit on June 30, so from a risk-based prioritization perspective, Chrome and Edge updates that take the focus leading up to Patch Tuesday. &lt;a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html" rel="noopener" target="_blank"&gt;CVE-2025-6554&lt;/a&gt; was resolved in build 138.9.7204.96/.97 for Windows, 138.0.7204.92/.93 for Mac and 138.0.7204.92 for Linux, which they indicated would roll out over the coming days/weeks.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released three updates for July Patch Tuesday resolving a total of 11 CVEs. The affected products include Ivanti Connect Secure and Policy Secure, Ivanti EPMM and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/july-security-update-2025"&gt;July Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;July update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Google Chrome and Microsoft Edge browsers are the top priority this month. Ensure you have deployed the latest updates to resolve the zero-day exploit (&lt;a href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html" rel="noopener" target="_blank"&gt;CVE-2025-6554&lt;/a&gt;) that was identified on June 30.&lt;/li&gt;
	&lt;li&gt;Windows Server OS updates are likely the biggest security priority this month, especially for those who experienced the DHCP issues after the June update and had to uninstall the June update.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Jul 2025 21:17:47 Z</pubDate></item><item><guid isPermaLink="false">ba181d8d-6bbb-41d4-9d70-0216bae9cdd8</guid><link>https://www.ivanti.com/blog/june-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>June 2025 Patch Tuesday</title><description>&lt;p&gt;June Patch Tuesday is upon us. There has been a lot of activity in the past few weeks. Mid-May was the &lt;a href="https://www.zerodayinitiative.com/blog?tag=Pwn2Own" rel="noopener" target="_blank"&gt;Pwn2Own Berlin 2025 event&lt;/a&gt;, and the $1M USD in rewards that were paid out came with many newly discovered vulnerabilities affecting Microsoft, Google, Mozilla, VMware, NVIDIA, Oracle and other vendors. Since the event, there have been several updates from many of these vendors, so expect a lot of third-party updates to update this month from releases leading up to Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Microsoft released updates resolving 66 CVEs, nine of which are rated Critical. In addition, there is one public disclosure and one zero-day exploit. Updates this month affect Windows, Office, SharePoint, Visual Studio, and .Net. The zero day and public disclosure are both resolved by the Windows OS update this month.&lt;/p&gt;

&lt;p&gt;Third-party updates from Mozilla, Google (including two recent zero-day exploits) and Adobe leading up to Patch Tuesday will add to the load. If your organization is updating applications like browsers on a weekly basis to keep up with continuous release applications commonly used to target end users, you should be up to date on all but Adobe. If not, you will want to ensure to get these queued up for your patch maintenance.&lt;/p&gt;

&lt;h2&gt;Microsoft exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Web Distributed Authoring and Versioning (WEBDAV) (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053" rel="noopener" target="_blank"&gt;CVE-2025–33053&lt;/a&gt;) which Microsoft has confirmed to be exploited in the wild. Microsoft rates the CVE as Important and it has a CVSS v3.1 score of 8.8. Risk-based prioritization would treat this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB Client (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073" rel="noopener" target="_blank"&gt;CVE-2025–33073&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important and it has a CVSS v3.1 score of 8.8. The code maturity is Proof-of-Concept and the vulnerability is remotely exploitable, which will make this a desirable target for threat actors. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Google Chrome continues their weekly security update cadence. Expect a Chrome update this week to add to the four releases and 14 CVEs resolved since May Patch Tuesday. This includes two zero-day exploits resolved in the past few weeks (CVE-2025–5419 and CVE-2025–4664).&lt;/p&gt;

&lt;p&gt;Mozilla has released multiple security updates since the Pwn2Own Berlin event. The two CVEs exploited in the event were resolved in the May 17 release (Firefox 138.0.4) and since then, Mozilla has released Firefox 139 and 139.0.4, as well as updates for Firefox ESR and Thunderbird. Ensure you have the latest Mozilla updates queued up this Patch Tuesday.&lt;/p&gt;

&lt;p&gt;Adobe has released updates for Acrobat Reader and six other products, resolving 259 CVEs. 225 of these were included in the Experience Manager update, with hefty contributions from a handful of diligent security researchers.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released one update for June Patch Tuesday resolving a total of three CVEs. The affected product is Ivanti Workspace Control.&lt;/p&gt;

&lt;p&gt;For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/june-security-update"&gt;June Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;June update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is the top priority this month with one zero-day exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053" rel="noopener" target="_blank"&gt;CVE-2025–33053&lt;/a&gt;) and one public disclosure (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073" rel="noopener" target="_blank"&gt;CVE-2025–33073&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Google Chrome should be a top priority if you have not deployed updates for June 2 and earlier, as it will resolve two zero-day exploits (CVE-2025–5419 and CVE-2025–4664).&lt;/li&gt;
	&lt;li&gt;Browsers in general should be updated weekly to keep up with the continuous release cycle. Edge, Chrome and Firefox received multiple updates since May Patch Tuesday, including multiple high-profile disclosures and zero-day exploits.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 10 Jun 2025 20:52:28 Z</pubDate></item><item><guid isPermaLink="false">34200be4-39ae-48b7-bc0f-9ef5f2e9cb32</guid><link>https://www.ivanti.com/blog/patch-tuesday-may-2025</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>May 2025 Patch Tuesday</title><description>&lt;p&gt;May Patch Tuesday resolves five actively exploited and two publicly disclosed vulnerabilities. Spoiler alert: all five zero-days are resolved by deploying the Windows OS update. Also, this month Windows 11 and Server 2025 updates include some new AI features, but they carry a lot of baggage. Literally – they are around 4GB! New AI features include Recall, Click to Do and Improved Windows Search.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a total of 72 new CVEs this month, six of which are rated Critical. The five zero-day vulnerabilities are rated Important, but using a risk-adjusted scoring model they would all be rated Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver for WinSock (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32709" target="_blank" rel="noopener"&gt;CVE-2025-32709&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain administrator privileges. The vulnerability affects Windows Server 2012 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a pair of Elevation of Privilege vulnerabilities in Windows’ Common Log File System Drive (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706" target="_blank" rel="noopener"&gt;CVE-2025-32706&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32701" target="_blank" rel="noopener"&gt;CVE-2025-32701&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerabilities affect all Windows OS versions. The vulnerabilities are confirmed to be exploited in the wild. Microsoft’s severity rating for both CVEs is Important and CVSS 3.1 of 7.8. Risk-based prioritization warrants treating these vulnerabilities as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Microsoft DWM Core Library (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400" target="_blank" rel="noopener"&gt;CVE-2025-30400&lt;/a&gt;) that could allow an attacker to elevate privileges locally to gain SYSTEM privileges. The vulnerability affects Windows 10, Server 2016 and later OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft resolved a Memory Corruption vulnerability in Microsoft Scripting Engine (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30397" target="_blank" rel="noopener"&gt;CVE-2025-30397&lt;/a&gt;) that could allow an unauthorized attacker to execute code over a network. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft’s severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft resolved a Remote Code Execution vulnerability in Visual Studio (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32702" target="_blank" rel="noopener"&gt;CVE-2025-30397&lt;/a&gt;) that could allow an unauthorized attacker to execute code locally. The vulnerability affects Visual Studio 2019 and 2022. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely.&lt;/p&gt;

&lt;p&gt;Microsoft resolved an Identity Spoofing vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26685" target="_blank" rel="noopener"&gt;CVE-2025-26685&lt;/a&gt;) that could allow an unauthorized attacker to perform spoofing over an adjacent network. The vulnerability affects Microsoft Defender for Identity. The vulnerability has been publicly disclosed, but the code maturity was set to Unproven and exploitability assessment is less likely.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe has released 13 updates this month resolving 39 CVEs, 33 of which are Critical. For more details, see &lt;a href="https://helpx.adobe.com/security.html" target="_blank" rel="noopener"&gt;Adobe’s Latest Product Security Updates&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release a weekly update shortly, so keep an eye out.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Ivanti security advisory&lt;/h2&gt;

&lt;p&gt;Ivanti has released four updates for May Patch Tuesday resolving a total of four CVEs and one CWE. The affected products include Ivanti Neurons for ITSM (on-prem only), Ivanti ICS, Ivanti Neurons for MDM and Ivanti EPMM.&lt;/p&gt;

&lt;p&gt;The Ivanti EPMM update resolves a medium and a high CVE that when chained together, successful exploitation could lead to unauthenticated remote code execution. Ivanti is aware of a very limited number of customers whose solution has been exploited at the time of disclosure.&lt;/p&gt;

&lt;p&gt;For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/may-2025-security-update"&gt;May Security Update on the Ivanti blog&lt;/a&gt; and &lt;a href="https://www.ivanti.com/blog/epmm-security-update"&gt;EPMM Security Updated&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;May update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Windows OS is your top priority this month with five zero-day exploits reported (CVEs).&lt;/li&gt;
	&lt;li&gt;Ivanti EPMM customers should apply either of the mitigation options or update as soon as possible.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 May 2025 22:03:04 Z</pubDate></item><item><guid isPermaLink="false">9933c7b4-38db-4e37-9af3-cdce170e5851</guid><link>https://www.ivanti.com/blog/april-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>April 2025 Patch Tuesday</title><description>&lt;p&gt;April Patch Tuesday appears to be a high count of resolved CVEs, but a low number of high priority risks. Microsoft has resolved 121 new unique CVEs this month, 11 of which are rated critical and one known to be exploited. The zero-day vulnerability is in the Windows OS this month, making that your top priority.&lt;/p&gt;

&lt;p&gt;In addition, Adobe has released 12 updates resolving 54 CVEs. Adobe ColdFusion was rated highest (Priority 1) and resolves 15 CVEs. Adobe Commerce and Experience Manager Forms were rated Priority 2 and resolved five CVEs and two CVEs respectively. The rest of the Adobe lineup was Priority 3.&lt;/p&gt;

&lt;p&gt;Update your browsers! Google Chrome updated this Patch Tuesday resolving two additional CVEs. On April 1, both Mozilla Firefox and Google Chrome updated. Mozilla Firefox resolved eight CVEs, and Chrome resolved thirteen CVEs. Microsoft Edge (Chromium) updated on April 3 in response to the April 1 Chrome update, which means we will have an additional Edge update coming later this week.&lt;/p&gt;

&lt;p&gt;Oracle is due to release their quarterly CPU on April 15, so keep an eye out for Oracle updates including Java, which will kick off the domino effect of alternative Java frameworks getting updates through the end of April and into early May.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824" target="_blank" rel="noopener"&gt;CVE-2025-29824&lt;/a&gt;) that could allow an attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all Windows OS versions. The vulnerability is confirmed to be exploited in the wild. Microsoft severity is rated as Important and has CVSS 3.1 of 7.8. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released updates for most of the Creative Suite including After Effects, Animate, Bridge, Illustrator, Media Encoder, Photoshop and Premiere Pro.&lt;/li&gt;
	&lt;li&gt;Google Chrome released an update resolving two CVEs. Expect Edge to be released later this week.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/#CriticalPatchUpdates" target="_blank" rel="noopener"&gt;Oracle’s quarterly CPU is scheduled for April 15, 2025&lt;/a&gt;. Expect updates for a number of Oracle products, but this release will also kick off the domino effect on all Java frameworks like RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and others.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released one update for April Patch Tuesday resolving a total of six CVEs. The affected products include Ivanti EPM 2022 and EPM 2024. For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/april-security-update"&gt;April Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;April update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is your top priority this month, with the only zero-day exploit reported (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824" target="_blank" rel="noopener"&gt;CVE-2025-29824&lt;/a&gt;).&lt;/li&gt;
	&lt;li&gt;Update all of your browsers! Last week Mozilla, Chrome and Edge received updates, and an additional Chrome update was released on Patch Tuesday. If you have not already, you should consider moving browser updates to a weekly cadence to reduce exposure time, as Chrome and Edge will receive weekly updates, and Firefox typically has two to three updates per month.&lt;/li&gt;
	&lt;li&gt;Expect Oracle updates on April 15 and additional updates for Java frameworks over the next few weeks.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Apr 2025 21:19:58 Z</pubDate></item><item><guid isPermaLink="false">63dbc7eb-03a8-4a08-92c7-8977b81ba969</guid><link>https://www.ivanti.com/blog/march-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>March 2025 Patch Tuesday</title><description>&lt;p&gt;Here in the Midwest US, we have a saying about March, “In like a lion, out like a lamb.” This is in reference to the month starting with strong winter weather and letting off as the month progresses. In fact, we just had a blizzard that dropped 9-12 inches of snow across most of the region overnight, but a week later I see grass and sunny skies and have shed the winter coat!&lt;/p&gt;

&lt;p&gt;At first glance, March Patch Tuesday looks like a lamb, but this lamb might have the teeth of a lion. The standard lineup of updates resolves 57 CVEs across the Windows OS, Office, .Net and Visual Studio, with a couple of Azure component updates in the mix. Google Chrome updated in the lead up to Patch Tuesday (March 10 update), and Adobe released seven updates, including Adobe Acrobat and Acrobat Reader.&lt;/p&gt;

&lt;p&gt;Now let’s talk teeth. There are seven known exploited CVEs for the March lineup.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft resolved six known exploited CVEs. The zero-day exploits affect the Microsoft Management Console, NTFS, Fast FAT, and the Win32 Kernel Subsystem. All six exploits are rated Important with CVSS scores ranging from 4.6 to 7.8. The good news is all six are resolved by the March Windows OS update, so the majority of the immediate risk is resolved by that one update.&lt;/li&gt;
	&lt;li&gt;Google resolved one known exploited CVE (&lt;a href="https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html" target="_blank" rel="noopener"&gt;CVE-2025-24201&lt;/a&gt;), which according to the release notes from Google is an out of bounds write-in GPU on Mac reported by the Apple Security Engineering and Architecture (SEAR) team – so likely only a concern for Mac users. (Based on Microsoft’s release notes, it looks like Edge has not resolved the five CVEs in the March 10 release.)&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Management Console (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26633" rel="noopener" target="_blank"&gt;CVE-2025-26633&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.0. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. An attacker would need to take additional actions to prepare the target environment for exploitation, but the vulnerability allows for a variety of user-targeted tactics to exploit, including instant message, email and web-based attacks scenarios. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24993" rel="noopener" target="_blank"&gt;CVE-2025-24993&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure vulnerability in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24991" rel="noopener" target="_blank"&gt;CVE-2025-24991&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 5.5. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Windows Fast FAT File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24985" rel="noopener" target="_blank"&gt;CVE-2025-24985&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Information Disclosure in Windows NTFS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24984" rel="noopener" target="_blank"&gt;CVE-2025-24984&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 4.6. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Win32 Kernel Subsystem (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24983" rel="noopener" target="_blank"&gt;CVE-2025-24983&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.0. The vulnerability affects older Windows editions including Windows 10 and Server 2008 to Server 2016. Microsoft has confirmed that this CVE is exploited in the wild. If exploited, the attacker could gain SYSTEM-level privileges. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Microsoft Access (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26630" rel="noopener" target="_blank"&gt;CVE-2025-26630&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects Microsoft Access 2016, Office 2019, Office LTSC 2021 and 2024, and Microsoft 365 Apps for Enterprise. Microsoft has confirmed that this CVE has been publicly disclosed, but the code maturity is set to be unproven. The disclosure could provide attackers with some additional information to formulate an exploit, but the lack of code samples will increase their efforts. Risk-based prioritization would indicate a slightly higher risk for a disclosure without functional code, but not enough to bump this CVE up to Critical.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities &lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Google Chrome released updates on March 10 resolving five CVEs, including one known exploited CVE (&lt;a href="https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html" rel="noopener" target="_blank"&gt;CVE-2025-24201&lt;/a&gt;). The exploit is documented as an out of bounds write-in GPU on Mac. The priority is higher for macOS than Windows for this update.&lt;/li&gt;
	&lt;li&gt;Adobe released seven updates resolving 37 CVEs. The updates affect Adobe Acrobat and Reader, Illustrator, InDesign, Substance 3D Sampler, Painter, Modeler and Designer. All seven updates are rated priority three and can be handled in the course of your monthly update activities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released two updates for the March Patch Tuesday resolving a total of two CVEs. The affected products are Ivanti Secure Access Client (ISAC) and Ivanti Neurons for MDM (N-MDM). For more details you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/march-security-update"&gt;March Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;March update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS update is the top priority update this month resolving six known exploited CVEs.&lt;/li&gt;
	&lt;li&gt;The March 10 Google Chrome update resolves one known exploited vulnerability on macOS, making the macOS Chrome update a priority.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Mar 2025 21:27:51 Z</pubDate></item><item><guid isPermaLink="false">e53e52e2-cdc6-4819-8a27-1e9fa5f4f45d</guid><link>https://www.ivanti.com/blog/february-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><category>Patch Management</category><title>February 2025 Patch Tuesday</title><description>&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="ojvY_mN7CMc"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;February Patch Tuesday is ramping up with releases from Adobe and Microsoft and an expected release from Google. Adobe resolved 45 CVEs across seven updates. The largest and highest priority is Adobe Commerce, which resolves 30 CVEs. Microsoft is coming down off a huge January release and only resolved 56 new CVEs this February. There are two new zero-day exploits and a revised Secure Boot zero-day in the mix, making the Windows OS a top priority this month.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Ancillary Function Driver for WinSock (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21418" rel="noopener" target="_blank"&gt;CVE-2025-21418&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. An attacker who exploited this vulnerability could gain SYSTEM privileges. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Storage (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21391" rel="noopener" target="_blank"&gt;CVE-2025-21391&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.1. The vulnerability affects Windows 10 to 11 and Server 2016 to Server 2025. Microsoft has confirmed that this CVE is exploited in the wild. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has revised the previously resolved Security Feature Bypass in Secure Boot (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" rel="noopener" target="_blank"&gt;CVE-2023-24932&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.7. The vulnerability was updated to include Windows 11 24H2 and Server 2025 as they are also affected by this known exploited and publicly exploited vulnerability. Additionally, Microsoft has released a more comprehensive update to all affected versions to fully protect against this vulnerability. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Spoofing Vulnerability in NTLM Hash Disclosure (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21377" rel="noopener" target="_blank"&gt;CVE-2025-21377&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.5. The vulnerability affects all Windows editions from Windows 10 to 11 and Server 2008 to Server 2025. Microsoft has confirmed that this CVE is publicly disclosed. The temporal metrics indicate Exploit Code Maturity is Functional, further increasing the risk of exploitation. Risk-based prioritization warrants treating this vulnerability as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Surface (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21194" rel="noopener" target="_blank"&gt;CVE-2025-21194&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.1. The vulnerability affects Microsoft Surface and Surface Dev Kit systems. Microsoft has confirmed that this vulnerability is publicly disclosed, but the code maturity is unproven.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Adobe released updates for InDesign, Commerce, Substance 3D Stager, InCopy, Illustrator, Substance 3D Designer and Photoshop Elements, resolving a total of 45 CVEs. Six of the updates are Priority 3. Adobe Commerce is set to Priority 1. The Commerce update resolves 30 of the 45 total CVEs Adobe resolved this month and warrants more immediate attention.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google Chrome is expected to update later today, which will trigger updates for Chromium-based browsers including Microsoft Edge, so be on the lookout for Chrome and Edge updates as we proceed through the week.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released five product updates resolving 11 CVEs, four of which are Critical. The affected products include Ivanti Cloud Service Application, Ivanti Neurons for MDM, Ivanti Connect Secure, Ivanti Policy Secure and Ivanti Secure Access Client. At the time of release, Ivanti is not aware of any exploitation or public discloses for the 11 resolved CVEs. For more information, &lt;a href="https://www.ivanti.com/blog/february-security-update"&gt;see the February Security Advisory page.&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;February update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft Windows is the top priority this month, with three known exploited CVEs, two publicly disclosed vulnerabilities resolved and two Critical CVEs.&lt;/li&gt;
	&lt;li&gt;Browsers are a prime target for attackers to target users. While including browsers in your monthly update process is recommended, it leaves a lot of CVEs exposed in between cycles. It’s recommended to move browsers to a weekly Priority Updates cadence. Mozilla Firefox releases two to three times a month. Google Chrome has been releasing security updates weekly since &lt;a href="https://security.googleblog.com/2023/08/an-update-on-chrome-security-updates.html" rel="noopener" target="_blank"&gt;August 2023&lt;/a&gt;. The Chromium-based Microsoft Edge has also been releasing weekly. Updating all browsers on a weekly basis is recommended to keep up with the steady stream of security fixes.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Feb 2025 22:45:40 Z</pubDate></item><item><guid isPermaLink="false">685583a1-a416-485a-a172-a083f2e8bf48</guid><link>https://www.ivanti.com/blog/january-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>January 2025 Patch Tuesday</title><description>&lt;p&gt;Microsoft has released updates resolving 159 unique CVEs for January. Among the lineup are three zero-day exploits and five publicly disclosed vulnerabilities. The exploited CVEs are all targeting Windows Hyper-V NT Kernel Integration VSP, making the OS update this month your most urgent priority. The public disclosures impact Windows Themes, Windows App Package Installer and three CVEs for Microsoft Access. There are 10 CVEs rated Critical affecting the components of the Windows OS and Microsoft Excel.&lt;/p&gt;

&lt;h3&gt;Microsoft exploited vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved three Elevation of Privilege vulnerabilities in Windows Hyper-V NT Kernel Integration VSP (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333" target="_blank" rel="noopener"&gt;CVE-2025-21333&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21334" target="_blank" rel="noopener"&gt;CVE-2025-21334&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21335" target="_blank" rel="noopener"&gt;CVE-2025-21335&lt;/a&gt;). All three vulnerabilities are rated Important and each has a CVSSv3.1 score of 7.8. These vulnerabilities affect Microsoft Windows versions 10, 11 and Server 2025. Microsoft is aware of exploitation of these vulnerabilities. Risk-based prioritization warrants treating these vulnerabilities as Critical.&lt;/p&gt;

&lt;h3&gt;Microsoft publicly disclosed vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Spoofing Vulnerability in Windows Themes (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21308" rel="noopener" target="_blank"&gt;CVE-2025-21308&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 6.5. The vulnerability affects Windows 10 and 11 as well as Server 2012 up to Server 2025. The CVE has been publicly disclosed, increasing the risk of exploitation. There are mitigations that could reduce the risk of this vulnerability or future security risks. For more details, refer to the Mitigations section of the CVE page.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows App Package Installer (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275" rel="noopener" target="_blank"&gt;CVE-2025-21275&lt;/a&gt;). The vulnerability is rated Important and has a CVSSv3.1 score of 7.8. The vulnerability affects Microsoft Windows versions 10, 11, and Server 2025. If exploited, an attacker could gain SYSTEM level privileges. The CVE has been publicly disclosed, increasing the risk of exploitation.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved three Remote Code Execution vulnerabilities in Microsoft Access (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186" rel="noopener" target="_blank"&gt;CVE-2025-21186&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21395" rel="noopener" target="_blank"&gt;CVE-2025-21395&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21366" rel="noopener" target="_blank"&gt;CVE-2025-21366&lt;/a&gt;). All three vulnerabilities are rated Important and each has a CVSSv3.1 score of 7.8. The vulnerabilities affect Microsoft Office 2019, Access 2016, Office LTSC 2021 and 2024 and Microsoft 365 Apps. The CVEs have been publicly disclosed, increasing the risk of exploitation.&lt;/p&gt;

&lt;h3&gt;Third-party vulnerabilities&lt;/h3&gt;

&lt;p&gt;Oracle’s Quarterly CPU is scheduled to release on January 21, so be prepared for updates for Oracle solutions, including Java. Once the Java release is out, expect all of the Java-based frameworks to update over the next few weeks.&lt;/p&gt;

&lt;p&gt;Adobe has released updates for Photoshop, Substance 3D Stager, Illustrator on iPad, Animate and Substance 3D Designer, resolving a total of 14 CVEs. All of the CVEs resolved are rated as Critical, but no exploitation or disclosures have been reported.&lt;/p&gt;

&lt;p&gt;Expect Google Chrome’s weekly security update today or tomorrow along with an update for Microsoft Edge shortly after.&lt;/p&gt;

&lt;h3&gt;Ivanti security advisory&lt;/h3&gt;

&lt;p&gt;Ivanti has released three product updates resolving 20 CVEs. The affected products include Ivanti Avalanche, Ivanti Application Control Engine and Ivanti Endpoint Manager. Ivanti is not aware of any exploitation or public disclosures for the 20 resolved CVEs. For more information, see the &lt;a href="https://www.ivanti.com/blog/january-security-update"&gt;January Patch Tuesday Security Advisory page&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;January update priorities:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft Windows is the top priority this month, with three known exploited CVEs, two publicly disclosed vulnerabilities resolved and eight Critical CVEs.&lt;/li&gt;
	&lt;li&gt;Microsoft Office is next in priority from a risk-based perspective. The update this month resolved three publicly disclosed CVEs in Access and two Critical CVEs in Excel. The two Excel CVEs could use the Preview Pane as an attack vector, making them ideal targets for threat actors.&lt;/li&gt;
	&lt;li&gt;Ensure your browsers are all up to date. Mozilla released last week and Google Chrome and Microsoft Edge update weekly with security fixes.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Jan 2025 23:35:11 Z</pubDate></item><item><guid isPermaLink="false">50f45922-286a-4aaa-8634-0a91e64f13b2</guid><link>https://www.ivanti.com/blog/patch-tuesday-december-2024</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>December 2024 Patch Tuesday</title><description>&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="lang" value="en"&gt;&lt;param name="id" value="bNWRvL_u2ew"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;Microsoft’s December Patch Tuesday release looks pretty straight-forward. They’ve resolved 70 new CVEs affecting Windows OS, Office, SharePoint, System Center Operations Monitor, Defender and a Microsoft AI project called Muzic.&lt;/p&gt;

&lt;p&gt;Adobe has released several updates, including Acrobat and Acrobat Reader. For details on all 16 Adobe product updates, check out their &lt;a href="https://helpx.adobe.com/security.html" rel="noopener" target="_blank"&gt;security advisory page&lt;/a&gt;. Adobe has set all updates as a priority 3 this month.&lt;/p&gt;

&lt;p&gt;Google Chrome has not released at the time of this blog but is expected to release soon.&lt;/p&gt;

&lt;h3&gt;Microsoft summary&lt;/h3&gt;

&lt;p&gt;While most of that lineup is pretty normal, the Microsoft Muzic AI project is an interesting one. &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49063" rel="noopener" target="_blank"&gt;CVE-2024-49063&lt;/a&gt; is a remote code execution vulnerability in Microsoft Muzic. To resolve this, CVE developers would need to take the latest build from GitHub to update their implementation.&lt;/p&gt;

&lt;p&gt;Priority wise, the big one for December is the Windows OS update, which accounts for 58, including all 16 Critical CVEs and the one Known Exploited CVE.&lt;/p&gt;

&lt;h3&gt;Zero-day vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Common Log File System Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138" rel="noopener" target="_blank"&gt;CVE-2024-49138&lt;/a&gt;), which could allow an attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all Windows OS editions back to Server 2008. The vulnerability is confirmed to be exploited in the wild, and some information about the vulnerability has been publicly disclosed, but that disclosure may not include code samples. The CVE is rated Important by Microsoft and has a CVSSv3.1 score of 7.8. Risk-based prioritization would rate this vulnerability as Critical, which makes the Windows OS update this month your top priority.&lt;/p&gt;

&lt;h3&gt;Ivanti security updates&lt;/h3&gt;

&lt;p&gt;Ivanti has released five security advisories for December, resolving a total of 11 CVEs. Affected products include Ivanti Cloud Service Application, Desktop and Server Management, Connect Secure and Policy Secure, and Patch SDK. For more details on the vulnerabilities resolved and links to product updates see the &lt;a href="https://www.ivanti.com/blog/december-security-update"&gt;December Security Update&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;December update priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS update is the highest priority this month, resolving 16 critical CVEs, one zero-day, and a total of 58 of the 70 new CVEs resolved by Microsoft this month.&lt;/li&gt;
	&lt;li&gt;Third-party updates for Chrome and Acrobat/Acrobat Reader and the Microsoft Office updates should be part of your normal maintenance schedule this month.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 10 Dec 2024 22:28:26 Z</pubDate></item><item><guid isPermaLink="false">4dc8dc1e-8249-4280-b9d8-599d78f2599c</guid><link>https://www.ivanti.com/blog/november-2024-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>November 2024 Patch Tuesday</title><description>&lt;p&gt;Microsoft has released updates resolving 88 new CVEs, four of which are rated Critical. The updates affect the Windows OS, Office, SQL Server, Exchange Server, .Net and Visual Studio. Two of the CVEs are confirmed to be exploited, two CVEs are publicly disclosed, and there is an advisory for Sharepoint Server.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Zero-day vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Task Scheduler (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49039" rel="noopener" target="_blank"&gt;CVE-2024-49039&lt;/a&gt;). The vulnerability is rated Important and has a CVSS v3.1 score of 8.8. The vulnerability is confirmed to be exploited. The vulnerability requires an attacker to run a specially crafted application on the target system to exploit the vulnerability and elevate their privileges to a Medium integrity level. The vulnerability affects Windows 10 and later OS editions including Windows 11 24H2 and Server 2025. From a risk-based prioritization perspective, the vulnerability should be treated as Critical.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Spoofing vulnerability in NTLM (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451" rel="noopener" target="_blank"&gt;CVE-2024-43451&lt;/a&gt;). The vulnerability is rated Important and has a CVSS v3.1 score of 6.5. The vulnerability has been confirmed to be exploited and has been publicly disclosed. If exploited, this vulnerability discloses a user’s NTLMv2 to the attacker who could use it to authenticate as the user. The attack would require minimal interaction with a malicious file, such as selecting (single-click), inspecting (right-click) or performing actions on the file. The vulnerability affects Server 2008 and later Windows OS editions, including Windows 11 24H2 and Server 2025. From a risk-based prioritization perspective, the vulnerability should be treated as Critical.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Public disclosures, third-party vulnerabilities and security advisories&amp;nbsp;&lt;/h2&gt;

&lt;h3&gt;Active Directory Certificate Services&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Active Directory Certificate Services (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49019" rel="noopener" target="_blank"&gt;CVE-2024-49019&lt;/a&gt;). The vulnerability is rated Important and has a CVSS v3.1 score of 7.8. The vulnerability has been publicly disclosed. If exploited, the attacker could gain domain administrator privileges. The vulnerability does provide additional mitigations including removing overly broad enroll or auto-enroll permissions, removing unused templates from certificate authorities and securing templates that allow you to specify the subject in the request. The vulnerability affects Windows Server 2008 and later Server OS editions. From a risk-based perspective, a public disclosure puts this vulnerability at a higher risk of being exploited and may warrant treating the vulnerability as a higher severity.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Microsoft Exchange Server&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Spoofing vulnerability in Microsoft Exchange Server (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49040" rel="noopener" target="_blank"&gt;CVE-2024-49040&lt;/a&gt;). The vulnerability is rated Important and has a CVSS v3.1 score of 7.5. The vulnerability has been publicly disclosed and exploit code maturity is Proof-of-Concept level making exploitation much easier for threat actors. The vulnerability exists in the P2 From header verification. Starting with the Exchange Server November 2024 Security Update, Exchange Server can detect and flag email messages that contain potentially malicious patterns in the P2 From header. By default, a message will be prepended to the message warning of suspicious behavior. &lt;a href="https://learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-non-compliant-p2from-detection?view=exchserver-2019" rel="noopener" target="_blank"&gt;Additional mail flow rules can be configured&lt;/a&gt; to automatically reject messages that exhibit suspicious behavior. Microsoft Exchange Server is often targeted by threat actors who specialize in Exchange exploits. From a risk-based prioritization perspective, the public disclosure and availably of PoC-level exploit code warrants treating this vulnerability as Critical.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Microsoft Defender&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an OpenSSL library vulnerability in Microsoft Defender (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-5535" rel="noopener" target="_blank"&gt;CVE-2024-5535&lt;/a&gt;). The vulnerability is rated as Important by Microsoft and has a CVSS v3.1 score of 9.1. The vulnerability affects Microsoft Defender Endpoint for iOS and Android, Azure Linux 3.0 and CVL Mariner. To exploit the vulnerability, an attacker could send a malicious link to a victim via email or convince the user to click a link. The attacker could also send a specially crafted email to the user without the need for them to open, read or click the link.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;SharePoint Server&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Microsoft has released a Defense in Depth update for SharePoint Server (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV240001" rel="noopener" target="_blank"&gt;ADV240001&lt;/a&gt;). The update does not include a severity or have any associated CVEs; it is just informing about the availability of defense in depth updates for SharePoint Server.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Third-party updates&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Adobe has released eight updates this month. All updates are rated Priority 3 by Adobe. Guidance from Adobe for Priority 3 updates: This update resolves vulnerabilities in a product that has historically not been a target for attackers. Adobe recommends administrators install the update at their discretion.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google Chrome has released an update on November Patch Tuesday which did not include CVEs in their release notes.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;November update priorities:&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Microsoft Windows OS updates should be your top priority this month as they resolve both known and exploited vulnerabilities.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Microsoft Exchange Server should be a priority for organizations running Exchange Server. The public disclosure with proof-of-concept puts this vulnerability at elevated risk of exploitation.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 12 Nov 2024 21:43:48 Z</pubDate></item><item><guid isPermaLink="false">b3bc7d74-1e6b-4754-94ea-ed6dfde67df2</guid><link>https://www.ivanti.com/blog/october-2024-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>October 2024 Patch Tuesday</title><description>&lt;h3&gt;October Patch Tuesday Summary&lt;/h3&gt;

&lt;p&gt;October is Cybersecurity Awareness Month! What better way to stay cyber-aware than to read up on the latest security updates hitting the market. Microsoft released updates for Windows, Office, .Net and several Azure services resolving a total of 117 new CVEs. There are two Zero-Day Exploits both of which have also been publicly disclosed. In addition, there are three more CVEs that have been publicly disclosed, but no reports of exploitation.&lt;/p&gt;

&lt;p&gt;Four additional third-party CVEs were reported as resolved in Microsoft’s release this month. These include three Chromium CVEs resolved in the latest Edge browser update and a CVE in Windows cURL Implementation. In addition, Zoom released an update resolving two vulnerabilities.&lt;/p&gt;

&lt;h3&gt;Microsoft Summary&lt;/h3&gt;

&lt;p&gt;Microsoft resolved 117 new CVEs this month, three of which are rated Critical by Microsoft. This month’s lineup has two Zero-Day exploits that have also been publicly disclosed putting them at risk of more widespread exploitation. Both of the zero-day vulnerabilities are resolved by this month’s Windows OS update making that your top priority to reduce risk quickly.&lt;/p&gt;

&lt;h3&gt;Microsoft zero-day vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Microsoft Management Console (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43572" target="_blank" rel="noopener"&gt;CVE-2024-43572&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8. The vulnerability has been publicly disclosed and there are confirmed exploits of this vulnerability in the wild. The CVE affects all versions of Windows including the newly released Windows 11 24H2. Due to the confirmed exploitation, this vulnerability should be treated as a high priority this month.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Spoofing vulnerability in MSHTML (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43573" target="_blank" rel="noopener"&gt;CVE-2024-43573&lt;/a&gt;). The vulnerability is rated Moderate by Microsoft and has a CVSS v3.1 score of 6.5. The vulnerability has been publicly disclosed and there are confirmed exploits of this vulnerability in the wild. The CVE affects all versions of Windows including the newly released Windows 11 24H2. Due to the confirmed exploitation, this vulnerability should be treated as a high priority this month.&lt;/p&gt;

&lt;h3&gt;Ivanti Security Advisories&lt;/h3&gt;

&lt;p&gt;Ivanti has released five security updates for October Patch Tuesday resolving eleven CVEs. Products affected include Ivanti Connect Secure\Policy Secure, Ivanti Avalanche, Ivanti Velocity License Server, Ivanti EPMM, and Ivanti CSA.&lt;/p&gt;

&lt;p&gt;Ivanti is aware of a limited number of customers running CSA v4.6 being exploited. Updating to CSA 4.6 519 will address CVE-2024-8963, but Ivanti is guiding customers to upgrade to CSA 5.0.&lt;/p&gt;

&lt;p&gt;Details on these releases can be found in Ivanti’s &lt;a href="https://www.ivanti.com/blog/october-2024-security-update"&gt;October Security Update blog&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Third-party Security Advisories&lt;/h3&gt;

&lt;p&gt;Zoom has released an update this month resolving two CVEs affecting Zoom Workplace App, Zoom Rooms App, and Zoom Meeting SDK. Both are information disclosure vulnerabilities and are rated Medium with CVSS Scores of 4.9.&lt;/p&gt;

&lt;h3&gt;October Priorities&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Windows OS updates are the highest priority this month. Both zero-day exploits are resolved by the OS update.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Oct 2024 22:15:28 Z</pubDate></item></channel></rss>